The FATF standards on
money laundering and terrorism financing category as “preventive
measures”.

These preventive measures
require financial institutions to identify their clients, create client
profiles, weed out those who from the start look like they may be bad guys or
controlled by bad guys, and then monitor the account activity of accepted
clients to see if that activity varies from what is expected or reflects the kind
of activity that known bad guys have undertaken in the past.

Financial institutions are then supposed to
look further into the questionable client activity and report to the government
when they suspect the client may be a criminal, including a terrorist. Key to the process of successful activity
monitoring is an understanding of what known bad guys have done in the past.
Studies of these past actions are known as typologies, which can include
special “red flag” indicators for particular types of nefarious activity.

The problem with adding terrorism financing to
the list of activities that financial institutions were required to look for,
and requiring them to report to the government when they suspected they saw it,
was that the FATF didn’t actually know how bad guys financed terrorism.

It was
one thing for governments to use their considerable investigative resources to
identify terrorists or terrorist organizations and then pass those names along
to financial institutions so that those institutions could verify whether they
had any such clients, but yet another to ask financial institutions to identify
terrorists based on their clients’ transactions alone.

Until recently, the
FATF’s and member governments’ attempts to develop terrorism financing typologies
and red flags had been fitful, incomplete, and based largely on a small number
of cases that were often not even relevant.
The United Nations Counter-Terrorism Implementation Task Force (CTITF) undertake a comprehensive study of terrorism
financing.

The Counter-Terrorism
Committee is a subsidiary body of the United Nations Security Council. the
United Nations Security Council unanimously adopted resolution 1373, which,
among its provisions, obliges all States to criminalize assistance for
terrorist activities, deny financial support and safe haven to terrorists and
share information about groups planning terrorist attacks.

The 15-member
Counter-Terrorism Committee was established to monitor implementation of the
resolution. While the ultimate aim of the Committee is to increase the ability
of States to fight terrorism, it is not a sanctions body nor does it maintain a
list of terrorist groups or individuals..

While the Counter-Terrorism Committee
is not a direct capacity provider it does act as a broker between those states
or groups that have the relevant capacities and those in the need of assistance

In 2012, HSBC, one of
the world’s largest banks, settled with the U.S. Government, avoiding criminal
prosecution of its executives, for helping to launder money for Mexican drug
cartels as well as Al Qaeda. HSBC provided a “gateway for terrorists to gain
access to U.S. dollars and the U.S. financial system.”

HSBC agreed to forfeit
1.256 billion dollars, the largest forfeiture amount ever by a financial institution
for a compliance failure. They don’t care as long as there is NO jail term. The
lost money can be made up in days .

Because they were let
off with zero criminal charges, the bank was allowed to go back to crooked
business as usual.

The Organized Crime and
Corruption Reporting Project published a comprehensive narrative that details
how billions of dollars were moved from Russian sources to bogus shell
companies before traveling further into various banks, and ultimately numerous
companies that inadvertently accepted corrupt funds.

Money entered the
Laundromat via a set of shell companies in Russia that exist only on paper and
whose ownership cannot be traced. Some of the funds may have been diverted from
the Russian treasury through fraud, rigging of state contracts, or customs and
tax evasion.

Money that might have helped repair the country’s deteriorating
roads and ports, modernize the health care system, or ease the poverty of
senior citizens – was instead deposited in a Moldovan bank.

HSBC, which is
headquartered in London, processed US$545.3m in Laundromat cash, mostly routed
through its Hong Kong branch

A great number of banks
accepted these funds easily, and the scheme touched upon at least 96 countries
receiving the tainted money including the United States, with money ending up
at Citibank and Bank of America. The OCCRP reported that “the 21 shell
companies fired out 26,746 payments from their various Trasta Komercbanka and
Moldindconbank accounts” between 2011 and 2014.

Earlier estimates
of laundered money were wrong, recent projections have increased that number
to as much as $80 billion.

US Congress could close
this loophole by passing a simple, two-page law requiring the beneficial owner
of a company to be identified whenever a U.S. company is formed. Treasury
submitted a legislative proposal to Congress that provides a framework for
closing this loophole once and for all.

Delaware is well-known
for its incorporation businesses, but it’s no worse than any other state in
this regard. With about $100 and 20 minutes, you can go to a U.S. state’s
website and form a company without disclosing the name of the person who will
own or control it.

Professional incorporation agents set up hundreds or even
thousands of these companies and then sell them, in some cases to those looking
to move money surreptitiously.

Criminals have learned that American companies
have an easier time obtaining bank accounts, and so they incorporate here in
large numbers. Financial investigators often come across U.S. shell companies
in their money hunts — and that may be where the trail ends.

WE ASK DONALD TRUMP TO
STOP THIS NONSENSE !

U.S. shell companies
have the dubious distinction of being the only money laundering method where
secrecy is provided by a government entity.

Stopping terrorist
financing and money laundering are bipartisan issues, and Congress’s support
for the work of my office is broad and deep on outside –but shallow and fickle
inside . Whenever legislators have tried over the years to pass
laws similar to the one recently proposed by Treasury, interested stakeholders
have defeated the bills every time.

This is simply unacceptable.

To mitigate the threat,
the Treasury Department issued a rule that will require U.S. banks opening
accounts for a company to obtain and verify the identity of the company’s
beneficial owner. That will help with companies that choose to bank here, but
it won’t stop criminals who use U.S. front and shell companies to open bank
accounts abroad.

And the burden for disclosing the true owners of companies
should fall primarily on those incorporating the companies in the first place.
To set this right will take an act of Congress—but as long as US congressmen
are in Jew Rothschild’s payroll this
wont happen.

After all Rothschild’s world financial empire is held together by
shell companies

QUOTE: The government had yesterday faced a major embarrassment in the Rajya Sabha as five amendments moved by the Congress and the CPI(M) to the Finance Bill were adopted and approved by the House.UNQUOTE

THIS IS LIKE FLEA RIDDEN CATS DOING MEEOW MEEOW AT PORT ROYALE --WHEN THE PIRATES ARE COUNTING THE TREASURE

WHO CARES?

5 AMENDMENTS WILL BE FLUSHED DOWN THE TOILET

RAJYA SABHA HAS NO POWERS OVER FINANCE

QUOTE: After Finance Minister Arun Jaitley moved the amended Finance Bill for consideration by the Lok Sabha, Deepender Hooda (Cong) said this was a "historic" occasion as never in the past had the Rajya Sabha amended the Finance Bill. : UNQUOTE
AIYOOOOOOO

ENSURE SOME EMINENT ECONOMISTS ARE MEMBERS OF THE RAJYA SABHA ( NOT ROTHSCHILDs ECONOMISTS )

NOT JOKERS LIKE SACHIN TENDULKAR AND REKHA

.

Chun Doo-hwan was the the
fifth President of South Korea from 1980 to 1988. President Chun was convicted
in Korea in 1997 of receiving more than $200 million in bribes from Korean
businesses and companies.

President
Chun and his relatives laundered some of these corruption proceeds through a
web of nominees and shell companies in both Korea and the United States.

The former president
and chief executive officer of BizJet International Sales and Support Inc., a
U.S.-based subsidiary of Lufthansa Technik AG with headquarters in Tulsa,
Oklahoma, that provides aircraft maintenance, repair and overhaul services, was caught in a scheme to pay bribes to
foreign government officials.

Bernd Kowalewski, 57,
the former President and CEO of BizJet, pleaded guilty in US federal court in, to conspiracy to
violate the Foreign Corrupt Practices Act (FCPA) and a substantive violation of
the FCPA in connection with a scheme to pay bribes to officials in Mexico and
Panama in exchange for those officials’ assistance in securing contracts for
BizJet to perform aircraft maintenance, repair and overhaul services.

Kowalewski and his co-conspirators paid bribes
directly to foreign officials to secure aircraft maintenance repair and
overhaul contracts, and in some instances, the defendants funneled bribes to
foreign officials through a shell companies.

WELL, HUNDREDS OF SUCH
CRIMES ARE HAPPENING IN INDIA.

WE NOT
KNOW HOW TO CATCH THESE CRIMINALS.

UNCLE OTTAVIO QUATTROCCHIs
WIFE MARIA BABY ONCE KICKED AN UNIFORMED
JAWAN WITH HER POINTY ITALIAN PUCCI ( OR WAS IT GUCCI ) SHOES , JUST BECAUSE HE DARED TO RUN A METAL
DETECTOR ON HER.

This rule allows you to predict how often
each number 1 through 9 will appear as the first non-zero digit in the data
set.

Benford's Law can be used to analyze
financial data and identify red flags. If the data doesn't look anything like
the distribution predicted by Benford's Law it may mean the numbers have been
manipulated.

Benford's law, also
called the first-digit law, is an observation about the frequency distribution
of leading digits in many real-life sets of numerical data. The law states that in many naturally
occurring collections of numbers, the leading significant digit is likely to be
small

For example, in sets
which obey the law, the number 1 appears as the most significant digit about
30% of the time, while 9 appears as the most significant digit less than 5% of
the time.

By contrast, if the
digits were distributed uniformly, they would each occur about 11.1% of the
time. Benford's law also makes (different) predictions about the distribution
of second digits, third digits, digit combinations, and so on.

It has been shown that
this result applies to a wide variety of data sets, including electricity
bills, street addresses, stock prices, house prices, population numbers, death
rates, lengths of rivers, physical and mathematical constants, and processes
described by power laws (which are very common in nature). It tends to be most
accurate when values are distributed across multiple orders of magnitude.

The law could be used
to detect possible fraud in lists of socio-economic data submitted in support
of public planning decisions.

Based on the plausible
assumption that people who make up figures tend to distribute their digits fairly
uniformly, a simple comparison of first-digit frequency distribution from the
data with the expected distribution according to Benford's Law ought to show up
any anomalous results.

Following this idea,
Mark Nigrini showed that Benford's Law could be used in forensic accounting and
auditing as an indicator of accounting and expenses fraud. In practice,
applications of Benford's Law for fraud detection routinely use more than the
first digit.

Benford’s Law gives the
expected patterns of the digits in tabulated data and it has been used by
auditors and scientists to detect anomalies in tabulated data

If somebody tries to
falsify, say, their tax return then invariably they will have to invent some
data. When trying to do this, the tendency is for people to use too many
numbers starting with digits in the mid range, 5,6,7 and not enough numbers
starting with 1.

This violation of Benford's Law sets the alarm bells ringing.

TIME FOR A KHAINI BREAK !

ALL THIS IS COPIED FROM ANCIENT KERALA MATH

THE VEDIC GOLDEN MEAN 1.618 ( SRI YANTRA ) , THE FIBONACCI SERIES ( VEDIC SERIES ) AND BENFORDs LAW , ARE
ALL INTERRELATED.

The Fibonacci numbers are

0, 1, 1, 2, 3, 5, 8, 13, ... (add the last
two to get the next)

The golden section numbers are

0·61803 39887... = phi = φ and

1·61803 39887... = Phi = Φ

In numbers that appear in tables of physical
and chemical constants. and similar
tabulations, the digit 1 appears as first digit almost three times more often,
as one would expect

Fibonacci and Lucas numbers tend to obey
Benford's law

Benford offered a general "law of anomalous
numbers. The probability that a random decimal begins with digit p is

log (p + 1) - log p

The first digits of Fibonacci and Lucas
numbers tend to obey very closely the formula of probability offered by
Benford.

The Lucas numbers or Lucas series are an
integer sequence named after the mathematician François Édouard Anatole Lucas (
stolen from Kerala Math ) who studied both that sequence and the closely
related Fibonacci numbers.

Similar to the Fibonacci numbers, each Lucas
number is defined to be the sum of its two immediate previous terms, thereby
forming a Fibonacci integer sequence.

The first two Lucas numbers are L0 = 2
and L1 = 1 as opposed to the first two Fibonacci numbers F0 = 0 and F1 = 1.
Though closely related in definition, Lucas and Fibonacci numbers exhibit
distinct properties.

All Fibonacci-like integer sequences appear
in shifted form as a row of the Wythoff array; the Fibonacci sequence itself is
the first row and the Lucas sequence is the second row.

The Wythoff array ( stolen from Kerala Math )
is an infinite matrix of integers derived from the Fibonacci sequence .. it can
also be defined using Fibonacci numbers or directly from the golden ratio and the
recurrence relation defining the Fibonacci numbers.

Like all Fibonacci-like integer sequences,
the ratio between two consecutive Lucas numbers converges to the golden ratio.

THE RATIO OF SUCCESSIVE TERMS IN A FIBONACCI
SEQUENCE TEND TOWARDS THE GOLDEN MEAN.

THE DIGITS OF ALL NUMBER MAKING UP THE FIBONACCI SERIES TEND TO CONFORM TO
BENFORDs LAW

THE FIRST DIGITS OF THE FIRST 100 FIBONACCI
AND THE FIRST 100 LUCAS NUMBERS APPROXIMATED
THE EXPECTED FREQUENCES OF BENFORDs LAW

( IT FITS BETTER IF WE INCREASE THE NUMBER
FROM 100 TO 1000 AND THEN FURTHER TO 2000 )

Below: The Sri Yantra which contains TOE, is drawn with the Vedic Golden Mean as the base ( 1.618 )-- it was drawn in ancient days , when the white man was was doing GRUNT GRUNT for language and living in caves, clubbing down animals and eating them raw..

THE WORLD MUST KNOW THIS TRUTH

EVERY VESTIGE OF MATH KNOWLEDGE CAME FROM
INDIA, TILL THE WHITE INVADER LANDED IN INDIA

A fraud audit is a
proven way to identify fraud. Locating and recognizing shell companies in your
accounts payable file is a critical task for today’s fraud auditor. The process
starts with effective data mining designed to locate favored vendors, false
billing, and pass-through fraud schemes.

The fraud audit procedures will focus
on proven techniques to determine if the vendor is a shell corporation using
the physical existence, legal existence, and the business capacity audit
program

Wherever there is huge
financial fraud-- shell companies are associated . While shell companies are frequently linked
to multiple forms of scams, law officials are unable to prosecute all cases
because state agencies do not collect enough ownership information on company
formation documents.

Thus, they leave no paper trail for the government to
trace back to a particular individual or individuals.

All inherent schemes
have two aspects: the entity structure and the fraudulent action. The first
step is building the fraud scenarios within the audit scope. The second is
building the audit response to the identified fraud scenarios.

Entity Structure---

Fraud scenarios
involving vendors, customers, and employees tend to use a false entity
structure to commit the fraudulent activity. Within each category, there will
be permutations that will affect the fraud auditing testing procedures.

The
most common false entities are:

• The entity was
created by the perpetrator, vendors, or customers. Vendors and customers are
either legally created or exist in name only. When the entity exists in name
only, the entity verification procedures will detect the false entity. For
legally created entities, the fraud auditing testing procedure should link the
incorporation date to first business date. As a guide, when the entity
incorporation date is within 90 days of first business transaction date, that
is a red flag of a false entity or a favored entity.

• The perpetrator
assumes the identity of a real entity such as a vendor, customer, or
employee. Therefore, the address or
telephone number within the company master file for the entity should not match
the address or telephone number of the entity verification procedures. A caveat
exists in the passthrough fraud scheme where one of the perpetrators is
employed at the real source of the goods or services, so it is possible to
obtain a match of records.

When the entity is
determined to be a real entity, there are generally three possible
outcomes:----

• Favorite entity
status indicates the entity is real, but there might be a real or perceived
conflict. If there is a conflict, the fraud scenario would be dependent on the
nature of the account, or else there is no fraud scenario occurring.

• The fraud scenario
links to a real entity, whereby a decision tree would aid in the determination
of the type of scenarios occurring.

• No fraud scenario is
occurring. When the entity is established as a real entity, a decision tree can
direct the auditor to the inherent scheme structure for the applicable core
business system.

For the red flag to be
an effective audit tool, the event must be observable and must be incorporated
into the fraud audit program. Red flags by their nature cause an increased
sensitivity to the likelihood of a fraud scenario occurring.

Not all red flags have
the same weight with regard to fraud susceptibility. The weight of a fraud red
flag correlates to the predictability of a fraud occurrence. Therefore, the
auditor needs to interpret the importance of the red flag to the fraud scenario
and be able to arrive at a conclusion regarding the occurrence of the fraud
scenario.

There are four
categories of red flags: data, documents, internal controls, and behavior.

The categories are
intended to aid the auditor in identifying the red flags in an orderly fashion,
whereb, the auditor should not view the process as a right or wrong exercise,
but instead know that certain items can occur in multiple categories.

For
example, a vendor invoice number can be a data category red flag observed
through the use of data mining or a document
category red flag observed through the application of audit testing
procedures.

In addition to the four
categories of red flags already mentioned, there are also two other types of
red flags:---

Trigger red flags and
awareness red flags.

With the trigger red
flag, the event is sufficient enough to require the auditor to perform fraud
audit procedures to determine if creditable evidence exists to suggest that the
fraud scenario is occurring.

As a guideline, there should be no more than five
trigger red flags per category, and preferably only three trigger red flags per
category. To the contrary, with awareness red flags, the event is not
sufficient to require the auditor to perform fraud audit procedures.

However,
the totality of all the awareness red flags will require an auditor’s judgment
on the need to perform fraud audit procedures. While both might lead to the
performance of fraud audit procedures, the underlying reasons differ.

As a
guideline for internal control audits, a red flag that links to a fraud
scenario via a key control is denoted as a trigger red flag, whereas, a red
flag that links to a fraud scenario via non-key controls is denoted as an
awareness red flag.

A trigger red flag is similar to the traditional audit use
of red flags, whereby when an internal control is not working, it “triggers” a
red flag.

The use of trigger and awareness red flags will change in fraud
audits or specific point analysis, whereas the link is directly associated with
concealment strategy and the elements of the fraud scenario.

Boards of directors,
stockholders, management teams, and professional standards all expect internal
auditors to respond to the risk of fraud in core business systems. Within a
company's accounts payable file, shell companies are being used to steal
millions of dollars from companies or to conceal bribery payments which violate
anti-bribery and corruption laws.

Red flags are used by
management to build fraud detection controls and by the auditor as the basis
for questioning the legitimacy of the business transaction.

For the red flag to be
an effective audit tool, the event must be observable and must be incorporated
into the fraud audit program. Red flags by their nature cause an increased
sensitivity to the likelihood of a fraud scenario occurring. Not all red flags
have the same weight with regard to fraud susceptibility.

The weight of a fraud
red flag correlates to the predictability of a fraud occurrence. Therefore, the
auditor needs to interpret the importance of the red flag to the fraud scenario
and be able to arrive at a conclusion regarding the occurrence of the fraud
scenario.

There are four
categories of red flags: data, documents, internal controls, and behavior. The
categories are intended to aid the auditor in identifying the red flags in an
orderly fashion, whereby, the auditor should not view the process as a right or
wrong exercise, but instead know that certain items can occur in multiple
categories.

For example, a vendor invoice number can be a data red flag observed
through the use of fraud data analytics or a document red flag observed through
the examination of the vendor invoice.

Red flags are similar
to the concept of circumstantial evidence in a legal proceeding. The red flag
is an inference test. It is not the observance of a red flag but the totality
of the weight of all red flags observed through the data collection process.

The process of
detecting shell corporations is a two-step process.

The first step is to
conduct fraud data analytics interrogation routines, which are designed to
locate vendors that are consistent with the data profile of a shell corporation
or transactions that are indicative of a shell corporation.

The second step is
to perform audit procedures which are designed to pierce the concealment
strategy or reveal the truth. The data mining strategy is a two-fold process.
The first step is to build the data profile for the fraud scenario. The second
step is to understand how the sophistication of the concealment strategy
impacts the fraud data analytics.

Government
registration: All entities have a legal registration. Employees have birth
records and corporations have registration requirements with an applicable
government office. The first step is to establish whether the entity is legally
created, then gather identifying information that can eventually be linked to
other pertinent information. Names of registrars; officers' addresses; and
dates related to entity creation, dissolutions, or changes tend to be the
critical information.

Real companies tend to
have insurance. The fraud testing procedure would consist of a request of the
certificate of insurance. Fortunately, such a request is a normal control
procedure in many companies, but for fraud audit purposes, the need is to examine
the certificate to take note the date of coverage and types of coverage.

Although the
methodology for conducting a fraud audit is different from traditional
auditing, the internal auditor employs many of the same skills and tools as is
used in a traditional audit. Fraud audits are a blend of new methodologies and
traditional audit tools

Fraud investigation
consists of a multitude of steps necessary to resolve allegations of fraud:
interviewing witnesses, assembling evidence, writing reports, and dealing with
prosecutors and the courts. Because of the legal ramifications of the fraud
examiners’ actions, the rights of all individuals must be observed throughout.

Unlike a financial audit, fraud examinations
should never be conducted without proper predication. Each fraud examination
begins with the prospect that the case will end in litigation. To solve a fraud
without complete and perfect evidence, the examiner must make certain
assumptions.

This is not unlike the scientist who postulates a theory based on
observation and then tests it. In the case of a complex fraud, fraud theory is
almost indispensable. Fraud theory begins with a hypothesis, based on the known
facts, of what might have occurred. Then that hypothesis or key assumption is
tested to determine whether it’s provable.

The fraud theory
approach involves the following steps, in the order of their occurrence:--

Analyze available data.

Create a hypothesis.

Test the hypothesis.

Refine and amend the
hypothesis.

Accept or reject the
hypothesis based on the evidence.

With that said, fraud
examinations incorporate many auditing techniques; however, the primary
differences between an audit and a fraud investigation are the scope,
methodology, and reporting Although fraud examination and auditing are related,
they are not the same discipline. So how do they differ?

First, there’s the question of timing. Financial audits are conducted on a regular
recurring basis while fraud examinations are non-recurring; they’re conducted
only with sufficient predication.

The scope of the
examination in a financial audit is general (the scope of the audit is a
general examination of financial data) while the fraud examination is conducted
to resolve specific allegations.

An audit is generally
conducted for the purpose of expressing an opinion on the financial statements
or related information. The fraud
examination’s goal is to determine whether fraud has occurred, is occurring, or
will occur, and to determine who is responsible.

The external audit
process is non-adversarial in nature. Fraud examinations, because they involve
efforts to affix blame, are adversarial in nature.

Audits are conducted
primarily by examining financial data. Fraud examinations are conducted by (1)
document examination; (2) review of outside data, such as public records; and
(3) interviews.

Auditors are required
to approach audits with professional skepticism. Fraud examiners approach the
resolution of a fraud by attempting to establish sufficient proof to support or
refute an allegation of fraud.

As a general rule
during a financial fraud investigation, documents and data should be examined
before interviews are conducted. Documents typically provide circumstantial
evidence rather than direct evidence.

Circumstantial evidence is all proof,
other than direct admission, of wrongdoing by the suspect or a
co-conspirator. In collecting evidence,
it’s important to remember that every fraud examination may result in litigation
or prosecution.

Although documents can either help or harm a case, they
generally do not make the case; witnesses do. However, physical evidence can
make or break the witnesses. Examiners should ensure that the evidence is
credible, relevant, and material when used to support allegations of fraud.

Fraud examiners are not
expected to be forensic document experts; however, they should possess adequate
knowledge superior to that of a lay person.

In fraud
investigations, examiners discover facts and assemble evidence. Confirmation is
typically accomplished by interviews. Interviewing witnesses and conspirators
is an information-gathering tool critical in the detection of fraud. Interviews
in financial statement fraud cases are different than those in most other cases
because the suspect being interviewed might also be the boss.

Auditing procedures are
indeed often used in a financial statement fraud examination. Auditing
procedures are the acts or steps performed by an auditor in conducting the
review.

According to the third standard of fieldwork of generally accepted
auditing standards, “The auditor must obtain sufficient appropriate audit
evidence by performing audit procedures to afford a reasonable basis for an
opinion regarding the financial statements under audit.”

Common auditing procedures routinely used
during fraud examination, as during financial statement examination, are
confirmations, physical examination, observation, inquiry, scanning,
inspection, vouching, tracing, re-performance, re-computation, analytical
procedures, and data mining; these are all vital tools in the arsenal of both
practitioners as well as of all financial assurance professionals.

There are four basic
detection methods for accounts receivable frauds. They include matching deposit
dates, customer confirmations, accounting cut-off analysis, and trend analysis
on written-off accounts. Account receivables frauds can be prevented through
the adequate segregation of duties.

The collection of cash, posting of accounts
receivable, and the writing off of old uncollectible accounts receivable should
all be done by different personnel if possible. Also, some customer receipts
can be made to a lock box rather than to the company’s normal mailing address.
This allows the customer to make payments directly to the bank and therefore
eliminate time delays.

Most inventory fraud is detected through
missing financial documentation, physical inventory counts, or analytical
review. If the company’s cost of sales has risen significantly from one period
to the next, this could either be because of legitimate reasons or because
embezzlements in significant amounts are being charged to the inventory
accounts.

The purchasing function of a business is
particularly vulnerable to employee abuses. Typical schemes involve fictitious
invoices, over-billing, checks payable to employees, and conflicts of interest.

Purchasing fraud doesn’t necessarily require collusion with another employee or
an outsider, although it often occurs. There was a case where a vendor opened up a credit card account for the personal
use of a client company’s purchasing officer.

The fraud examiner can also use the computer
to facilitate analytical review of timing of bids, patterns of bids, amount of
work, patterns of new vendors, and similar trends.

A false billing fraud
affects the purchasing cycle, causing the company to pay for nonexistent or
non-essential goods or services. Most false billing frauds involve a service,
since it is easier to conceal a service that is never performed than to conceal
goods never received, the most common billing scheme is setting up one or more
bogus vendors.

There are several ways
to do this. The most common is to create a fictitious vendor (often called a
shell company), open a bank account in the shell company’s name, and bill the
victimized company. The perpetrator then creates an invoice and sends it to his
employer. Invoices can be professionally produced via computer and desktop
publishing software, typewritten, or even prepared manually.

Often, the most
difficult aspect of a fraudulent billing scheme is getting the false invoice
approved and paid. In many instances of billing fraud, the person perpetrating
the fraud is also the person in the company who is authorized to approve
invoices for payment.

Another popular means of getting invoice approval is to
submit invoices to an inattentive, trusting, or “rubber-stamp” manager.
Furthermore, perpetrators often create false supporting documents to facilitate
approvals and payments, e.g., voucher packages.

A perpetrator can also
use a shell company to perpetrate a pass-through billing scheme: the
perpetrator places orders for goods with his shell company, has his shell
company order the goods from a legitimate supplier at market prices, and then
sells those goods to his employer at inflated prices.

The fraud lies in the
fact that the victimized company is buying the goods it needs from an
unauthorized vendor at inflated prices. The perpetrator “profits” from the
inflated prices gained while acting as an unauthorized “middle man” in a
necessary company transaction.

Rather than utilizing
shell companies to over-bill, some employees generate false disbursements
through invoices of non-accomplice vendors. In what is called a pay and return
scheme, the perpetrator makes an error in a vendor payment to facilitate the
theft.

One way to do that is to overpay or double-up on payments, request a
check from the vendor for the excess, and steal the check when it arrives.

Another scenario is to pay the wrong vendor by placing vendor checks in the
wrong envelopes, then calling the vendors to explain the mistake and requesting
the return of the checks. When the checks return, they are stolen. The support
documents are sent through the accounts payable system a second time; and these
checks are sent to the proper vendors.

Another scheme involves
purchasing personal items with company money. One popular way to do this is to
make a personal purchase, then run the unauthorized invoice through the
accounts payable system.

If the perpetrator is not in a position to approve the
purchase, s/he may have to create a false purchase order to make the
transaction appear legitimate or alter an existing purchase order and have an
accomplice in receiving remove the excess merchandise.

Another way to purchase
personal items with company money is to have the company order merchandise,
then intercept the goods when they are delivered. To avoid having the
merchandise delivered to the company, the perpetrator often will have it
diverted to his home or some other address, such as a spouse’s business
address.

A third way to purchase personal items with company money is to make
personal purchases on company credit cards. No matter which of the approaches
is used, the perpetrator will either keep the purchases for personal use or
turn the purchase into cash (or a credit card refund) by returning the
merchandise.

Red flags usually present when a false billing
fraud is taking place, including:----

An unexplained increase
in services performed (services that were paid for, but never performed);

Payments to unapproved
vendors;

Invoices approved
without supporting documents;

Falsified or altered
voucher documents; for example, altering a purchase order after its approval;

Inflated prices on
purchases or orders of unnecessary goods and services;

Payments to an entity
controlled by an employee;

Multiple payments on
the same invoice or over payments on an invoice;

Personal purchases with
company credit cards or charge accounts;

Excessive returns to
vendors, or full payment not received for items returned;

A vendor with a post
office box address.

Employers should be
thoroughly briefed on benefits for fighting fraud, reducing error and sharing
knowledge that a well-planned and executed vacation and concurrent testing
policy can bring to the fraud prevention effort.

The efficacy of modern
fraud prevention programs has been vastly improved by advances in data mining,
analytics and the near ubiquitous cloud based storage and availability of
client transactional data; the advances, however, have been accompanied by some
confusion on the part of fraud prevention professionals in the incorporation
of these new tools into an effective,
risk based, prevention program.

Three
common sources of confusion usually arise during the implementation process of
analytically supported fraud prevention schemes; first, is the confusion between the continuous monitoring of
transactions (made possible by data mining and analytics coupled with
enterprise risk management approaches for the identification of high risk
business processes) and continuous auditing for fraud.

Second is the need to understand the role of
the continuous auditing for fraud in high risk business processes as a meta
control (i.e., as a control of controls) and third is the concern of separation
of duties (i.e., who will do what when actual instances of suspected fraud are
identified by the process).

The continuous,
analytically based, monitoring of high
risk business processes found to be especially vulnerable to pre-identified, attempted fraud scenarios is a dynamic
process (i.e., the fraud examiner/auditor can turn analytical procedures on and
off by re-configuring tests based on what fraud scenarios and levels of
accompanying risk s/he feels are
presently most active as threats.

By
continuously monitoring particular, configurable high risk items, continuous
testing for the presence of likely fraud scenarios constitutes a wholly new
control level, acting as a meta control.

For example, a bank’s analytically based loan transaction system can
issue an alarm regarding the presence of a suspected component of a fraud
scenario and issue an alarm, under pre-specified circumstances, to the bank manager’s
supervisor as loans to a given customer exceed pre-authorized levels.

This fraud prevention program measure thus
increases the number of configurable controls (e.g., choosing to issue an alarm
and when) by going past simple continuous monitoring all way to the level of
continuous auditing/testing and subsequent management alert.

Implementing this type
of approach to fraud prevention generally means taking the following general
types of steps:--

—identifying the
client’s high risk business processes for scenario testing. The choice of high risk business processes
should be integrated into the annual fraud prevention plan and the enterprise
risk management (ERM) annual review.
This exercise should be integrated with other compliance plans (for
example, with the internal audit annual plan, if there is one).

—identify rules that
will guide the analytically based fraud scenario testing activity; these rules
need to be programmed, repeated frequently and reconfigured when needed. As an example, a financial institution might
have defined a critical component of a given fraud scenario; in response the bank monitors all checking
accounts nightly by extracting files that meet the criteria of having a debt
balance that is 20 percent larger than the loan threshold for a certain type of
customer.

—determine the
frequency of testing for the critical fraud scenarios and related business
processes; this is important because the chosen frequency of testing has to
depend on the natural rhythm of the subject business process including the
timing of computer and business activities and the availability to the client
of fraud examiners and auditors with experience of the underlying fraud
scenario.

—cost benefit analysis
needs to be performed; only the most high risk business processes vulnerable to
a given frequently occurring fraud
scenario should be continuously tested; once the threat is determined to have
subsided (perhaps by the application or tightening of prevention controls) shut the continuous
testing down as no longer cost effective.

—mechanisms must be in
place to communicate positive testing results to business owners and the
communication must be independent, objective and consistent; all the parties
who will address elements of the suspected fraud and whose role requires taking
some pre-defined action under the identified fraud scenario must be informed.

The evolution of fraud
prevention programs to incorporate analytically based fraud evaluation and
examination testing on a continuous and near continuous basis is a giant step for the fraud examination and
auditing professions.

This evolution will take time, substantial attention from
senior management and additional costs and resources as continuous fraud
auditing activities are implemented and extended; these efforts will have a
lasting effect on the future of both professions.

One of the biggest
challenges of detecting, investigating and preventing employee fraud is the
fact that there are so many types of fraud and theft that require different
methods for discovery.

Every department presents opportunities for employees to
steal, although it’s been widely reported that a disproportionate percentage of
theft is carried out by employees in senior positions and that employees
involved in accounting and finance are the most frequent offenders.

Most employee fraud
schemes fall into the following fraud categories:----

Assign a trusted
outside contractor to review and reconcile accounts at regular intervals.

Rotate duties of
employees in accounts payable and accounts receivable.

Make it mandatory for
employees to take vacation time.

Set up an automated
positive pay system to detect fraud.

Data theft can
include:----

Trade secret theft –
theft of proprietary information to sell to a competitor

Theft of customer or
contact lists – a departing employee copies or downloads lists of the company’s
contacts to either sell or use

Theft of personally
identifiable information (PID) – an employee steals or shares credit card
numbers, client lists or other valuable PID to sell to other parties

To prevent and detect
data theft:----

Restrict access to
company proprietary information to only those who need it in the course of
their jobs.

Set up IT controls to
alert management of large data downloads or transfers or downloads and
transfers that occur at odd times.

Purchase software that
alerts management of suspicious activity on a company network, such as an
employee trying to access sensitive information.

Dispose of confidential
information properly, by shredding documents and completely removing data from
electronic devices before redeploying or disposing of them.

Use strong passwords
for all computers and devices that can access sensitive information.

Implement a clean-desk
policy that prohibits employees from keeping sensitive information on their
desks while they are not present.

High profile empllyee
frauds, such as bribery and kickbacks, can damage much more than a company’s finances.
The reputational hit from a corruption accusation can deter business, affect
employee morale and affect an organization’s stock price.

These frauds can
include:----

Bribes – An employee
pays or provides a benefit to an official to secure an advantage for the
company or for the employee.

Kickbacks – An employee
receives payments or benefits from third parties in return for business
advantages or for unauthorized discounts.

Shell company fraud
schemes – An employee or company officer may use a shell company to launder
money, pay bribes, divert assets or evade taxes.

Product substitution –
A contractor, acting on its own or in collusion with an employee in the
purchasing company, substitutes inferior or counterfeit materials for the
materials specified in the contract.

To prevent and detect
bribery and corruption:---

Have a strong code of
ethics and ensure everyone in the company, from the top down, knows what it
says and puts it into practice.

Ensure those at the top
levels of the company set an example that makes it clear that bribery and
corruption are not tolerated.

Discipline employees
who breach the company’s code of ethics.

Conduct due diligence
on all third parties your company does business with.

Look for product
substitution red flags such as:----

High numbers of tests
or failures

Unusually high numbers
of repairs or replacements

Lack of warranty
information in packaging

Unbranded packaging

Products that don’t
look like the product ordered

Conduct a risk
assessment to look for areas to watch more closely

Train all employees on
bribery and corruption prevention

Reward employees for
ethical behavior

Employee Fraud
Detection Tips. Watch for the following red flags:---

Employees with a lavish
lifestyle that doesn’t match their salary

Employees who don’t
take vacation

Employees who routinely
stay late and work on weekends

Frequent tips or
complaints about an employee

Inventory shortages

An employee who
reluctant to share his or her job function

Large number of
write-offs in account receivable

Employees who seem to
feel the rules don’t apply to them

The best way to detect
employee fraud is through tips, which is why implementing a whistleblower
hotline can be the best deterrent.. Employees who know that there’s a hotline
and a company culture that encourages its use have more than just the bosses to
be worried about. Every employee becomes the eyes and ears of the company.

The most important task
for tracing and tracking shell companies and contacts is to be able to document
the linkage between all the information uncovered. The amount of leads, dead
ends and information can be overwhelming; a single piece of important information
could go unnoticed or unlinked.

Most investigators can't afford expensive
mapping technologies. The next best option is a free online mapping and
relationship tool, www.draw.io, which investigators can use to create easy
relationship diagrams for presentations and reports and keep track of
inter-related connections.

Map every piece of information — no matter how
small. An address or phone number could be the key to uncovering the shell
network. Search online for various combinations of phone numbers and addresses.

Shell incorporators
might have been vigilant in concealing public records' information on involved
entities, but they may have been careless when setting up the corresponding
website addresses.

Using "Who is
lookup" search engines, you can discover:----

Domain ownership

IP addresses.

Physical addresses of
websites.

Website administrators
and their contact information.

Website creation dates.

Evaluating online presence--Shell
incorporators have a hard time faking an active and robust online presence
because these companies technically don't exist. What constitutes a robust
online presence?

The existence of a
well-designed website.

The presence of other
online content.

Periodic and regular
updates of information.

Contact email addresses
that are linked to a legitimate website address, not free email accounts.

The evidence is clear:
Shell companies exist, they are plentiful, and their connections and networks
can be vast. Depending on the size and international breadth of your
organization, it could be a victim or an unwitting pawn. Reviewing and
monitoring your internal data will reduce your risk of involvement with a
shell.

Review all available
internal data that contains contact, banking, address and ownership
information, such as vendor/customer data, wire transfer data, ship to/ship
from locations for sales and purchases, purchase orders and invoice support
documentation.

What should you be looking for?----

Information that
doesn't make sense given the nature of the business relationship with the
entity.

IndiaIndia has long-emphasized that it must deal with its own development without necessarily prioritizing global warming, but since the election the country's energy minister has said that the country will continue to push for clean energy. “India does not get affected or dictated in policy or direction by any other part of the world,” said Energy Minister Piyush Goyal in February.
##########

PIYUSH GOEL

ARE YOU AND PM MODI WORKING FOR JEW ROTHSCHILD OR BHARATMATA???

WE WATCH

AS THE ENERGY MINISTER ( COAL ) IF YOU WANT SOLAR PANELS AND WIND TURBINES, WE THE PEOPLE OF INDIA WANT YOUR RESIGNATIONWE WILL NOT ALLOW MODI TO MOTHBALL COAL-- COME WHAT MAY

IT IS TIME YOU AND MODI BOTH FELT PEOPLEs POWER --IT WILL SCALD YOU BOTH

I HAVE WRITTEN THIS SIX PART POST FOR OUR USELESS DUO -- MODI AND GOEL --POODLES OF JEW ROTHSCHILD..http://ajitvadakayil.blogspot.in/2015/12/thermal-coal-power-plants-clean-exhaust.html

HOW IS MODI SO SURE THAN WE HAVE ONLY 10 LAKH SHELL COMPANIES ?TODAY EVEN DOCTORS AND LAWYERS OPERATE SHELL COMPANIES

THE WAY FORWARD TO TO MAKE RETIRED WHISTLE BLOWERS TALK-- BY GIVING THEM AND ANONYMITY AND INCENTIVES .. EVEN GIVING THEIR CHILDREN JOB PREFERENCE WILL DO THE TRICKWE THE PEOPLE WILL NOT ACCEPT "RAGADKE KHAINI MOONH MEIN DHALL " SPY VERSUS SPY PANDU SHITTHE WHOLE WORLD HAS MOVED AHEAD. INDIA IS LAGGING

WE CANT BECOME THIS PLANETS NO 1 SUPERPOWER IN 16 YEARS IN THIS PATHETIC STATUS QUO.

FOR ME WRITING THIS 32 PART SERIES WAS SHEER TORTURE.

LET SOMETHING GOOD COME OUT OF ALL THIS.

THE MUSLIMS IN INDIA DO NOT KNOW THAT THE TOP MAFIA MUSLIMS IN MUMBAI WERE ALL CRYPTO JEWS

USE DRONES IN KASHMIR AND RED CORRIDOR--SPLASH THE TRAITORS FROM THE SKY.

I ASK THAT THIS COMMENT BE PUT IN PM MODIs, AJIT DOVALs, AND RAJNATH SINGHs WEBSITES

Eros Associated Execs Admit on Hidden Camera They Will Launder Money Through Films

A CNN India exposé catches four Eros International (NYSE:EROS) associated director/producer/writers on hidden camera discussing methods for laundering money through their films.Rather than disassociate themselves with these film executives following the exposé, Eros instead worked closely with all of the individuals and even acquired a 50% interest in one of their production companies in 2016.The apparent ties to money launderers raises serious questions about Eros’s use of numerous offshore asset havens and its byzantine entity structure.Additional questions should be asked about the company’s tumultuous financial controls including (a) the use of at least 9 different auditors (b) 12 auditor resignations over the past 4 years and (c) insider allegations of the use of dummy production deals to channel assets to company family members.In order to protect U.S. investors, today we are calling for a full and thorough investigation of the companysource https://geoinvesting.com/eros-associated-execs-explain-launder-money-through-films/?utm_campaign=shareaholic&utm_medium=email_this&utm_source=email

WE KNOW WHY JEW ROTHSCHILDs RATING AGENCY S&P HAVE EROS INTERNATIONAL ( FILM DISTRIBUTORS LULLA FAMILY ) WITH A B+ RATING

High-yield DOLLAR bonds, have been opened for subscription for raising hundreds of millions -- five-year maturity, with fixed rate,

This is the first overseas debt-fund raising by any film entertainment company from India--Eros is based in Secaucus, New Jersey, USA

Knight Assets & Co., a London-based investment firm and Glaucus Research Group California LLC ( Soren Aandahl ) said that Eros may be fabricating revenue, ( a claim that Eros has denied ), and that Eros equity is worth “zero.”

Wells Fargo’s Eric Katz has questioned why Eros reports that an increasing proportion of its sales come from the UAE, rather than India. Eros says Indian buyers of content obtain rights through UAE subsidiaries to avoid tax ..

Indian companies have chosen to buy its content through offshore tax-haven shell companies. Eros itself has a UAE-based subsidiary, which owns all the international rights to its library. Eros wouldn’t disclose the counterparties driving the UAE sales, citing contract confidentiality.

In 2006, Eros International Plc, the holding company of the Eros Group, became the first Indian media company to list on the Alternative Investment Market (AIM) of the London Stock Exchange.

In 2010, Eros listed its Indian subsidiary Eros International Media Limited on the Bombay Stock Exchange (BSE) and National Stock Exchange (NSE) in India. Eros International runs a Netflix-style subscription service.

not only that the pin worms will NOT come out of the a n u s to lay eggs in oxygen rich environment--and you will have good sleep....

more bedoiuns died on pin worms than any other disease....

this OXYGEN SURCHARGE VIA A NU S is a 6000 year old ayurvedic remedy....Go0gle for the blogpost below-----……………………………………………….. THE HUMAN APPENDIX, THE MISUNDERSTOOD ORGAN VADAKAYIL …………..capt ajit vadakayil..

I have seen Nigerians or Africans as early as 1995 on Mohammed Ali road . They would stand near a pillar in the alley and do drugs and then sell. That whole Mohammed Ali road is the den of anti Nationals. Be it drug mafia or shell companies. I know it as I use to do part time job in that vicinity.Now they are every where. This is the same as Pathan's that we saw in 80 and 90's. Hard core homosexuals these Pathan's were. We as kids won't even go near them. Rothchilds want to make India a multi foreign lingual society so they can confuse us and screw us

The Prophet was buried in the same room in which he died. It was one of the rooms in which he lived with one of his wives AISHA , where it is now located in the south-east corner of Al-Masjid al-Nabawi (Mosque of the Prophet) in Medina.

When Saud bin Abdul-Aziz took Medina in 1805, his followers, the CRYPTO JEW Wahhabis, demolished nearly every tomb dome in Medina in order to prevent their veneration.

Muhammad's tomb was stripped of its gold and priceless jewel ornaments, but the dome was preserved ..The dome was painted green in 1837 C.E. and came to be known as the "Green Dome"

DO MUSLIMS IN INDIA AND PAKISTAN KNOW THAT MOST OF THEIR THEIR TOP CLERICS ARE CRYPTO JEWS--IN THE PAYROLL OF JEWS ?

THESE CLERICS ( WHO SUPPORT TRIPLE TALAQ ) DO NOT HAVE ZEBIBA MARKS ON FOREHEAD OR HAVE IT IN THE WRONG PLACE

THE INDIAN MUSLIM NO LONGER READS FROM RIGHT TO LEFT --LIKE THEIR PAKISTANI COUNTERPARTS

THE INDIAN MUSLIM IS NOW AWARE

MUSLIM WOMEN AND EDUCATED MUSLIMS ( WHO DO NOT CARE FOR THESE CRYPTO JEW CLERIC ) VOTED FOR BJP

TODAY A MUSLIM IS WONDERING--WHY DO WE HAVE TO GO ALL THE WAY TO MECCA TO KISS A BLACK STONE --KEPT AT KISSING LEVEL , 5 FEET ABOVE THE GROUND AT THE SOUTH EAST CORNER ( AGNEYA AS PER VAASTU ) CORNER OF KAABA ?

THE MUSLIM KNOWS THE ORIGINALS BLACK STONES STONES LIE IN INDIA

THE KAABA STONE WAS STOLEN LONG AGO AND REPLACED WITH BLACK PUMICE VOLCANIC STONES GLUED TOGETHER AND PAINTED OVER WITH BLACK

THE INDIAN MUSLIM NOW NOTICE THAT THEIR TOP CLERIC HAVE EITHER NO ZEBIBA MARK OR ZEBIBA MARK IN THE WRONG PLACE

TIMES ARE CHANGING

THE MUSLIMS NOW KNOW THAT ISIS WAS CREATED / ARMED/ FUNDED BY JEWS

THEY KNOW THAT WAHABBI/ SALAFI FUNDS ARE JEWISH

THEY KNOW WHY THE DESERT KINGS NEED PAKISTANI AND MORROCAN MERCENERIES TO PROTECT THEIR PALACED--BECAUSE THEIR OWN MUSLIM PEOPLE KNOW THAT THEIR RULER KINGS ARE JEWS --INSTALLED BY JEW ROTHSCHILD ( ONLY TILL ALL OIL IS SUCKED OUT ).

TODAY THE SIKHS KNOW -- THAT ALL THEIR TEN GURUS MARRIED HINDU KHATRI GIRLS AND THE FIRST NINE GURUS HAD HINDU CEREMONIES FOR CREMATION ...AND THAT THEIR GURU GRANTHSAHIB IS PACKED WITH ROTHSCHILD CREATED FAKE DASA VERSES.

BE ON THE SAME PAGE WITH PUTIN AND MODI ( ABOLISH CARBON TAX ) BEFORE G20 AT HAMBURG IN THE FIRST WEEK OF JULY 2017...

SIFT THE FOCUS FROM CARBON DI OXIDE TO METHANE AND NITROUS OXIDE..

METHANE WILL KILL THIS PLANET.. IT IS A TIME BOMB CURRENTLY TICKING AWAY....

Cut through the bullshit--

Carbon tax is a price instrument.. while Cap-and-trade is a quantity instrument

ONLY JEWS MAKE MONEY OUT OF THIN AIR BY SITTING ON THEIR ASSES..

A carbon tax imposes a tax on each unit of greenhouse gas emissions and gives firms .

The tax is set by assessing the cost or damage associated with each unit of pollution and the costs associated with controlling that pollution. Getting the tax level right is key: too low and firms and households are likely to opt for paying the tax and continuing to pollute, over and above what is optimal for society. Too high and the costs will rise higher than necessary to reduce emissions, impacting on profits, jobs and end consumers.

By contrast, a cap-and-trade system sets a maximum level of pollution, a cap, and distributes emissions permits among firms that produce emissions. Companies must have a permit to cover each unit of pollution they produce, and they can obtain these permits either through an initial allocation or auction, or through trading with other firms.

Since some firms inevitably find it easier or cheaper to reduce pollution than others, trading takes place. Whilst the maximum pollution quantity is set in advance, the trading price of permits fluctuates, becoming more expensive when demand is high relative to supply (for example when the economy is growing) and cheaper when demand is lower (for example in a recession). A price on pollution is therefore created as a result of setting a ceiling on the overall quantity of emissions.

In certain idealized circumstances, carbon taxes and cap-and-trade have exactly the same outcomes, since they are both ways to price carbon.

However, in reality they differ in many ways.

With cap-and-trade, it has often been the case that permits are given out for free initially (known as "grandfathering"). This means cheaper compliance for industry in the early stages of the scheme, because they only pay for any extra permits bought from other firms – not for the initial tranche of permits given to them to cover most of their emissions under 'business as usual'.

This approach is obviously popular with industry and explains why grandfathering has been used, since it helps get firms to accept controls on emissions in the first place. By contrast, with a tax there is an immediate cost for businesses to pay on every unit of greenhouse gas produced, so there is a bigger initial hit to the balance sheet. Grandfathering is BULLSHIT.

Under a tax, the price of emitting a unit of pollution is set, but the total quantity of emissions is not. Therefore a tax ensures everyone knows the price being paid (at least for the immediate future) for each unit of carbon dioxide emitted, but uncertainty remains about the actual quantity of emissions.

Conversely, cap-and-trade provides certainty about the quantity of emissions (it cannot exceed the cap), but uncertainty about the cost of achieving these reductions. If the level of environmental damage is more sensitive, then it is important to be sure what the quantity of emissions is, which points to cap-and-trade. Conversely if the cost of reducing pollution is more highly sensitive to changes in emissions, it is better to be sure about the cost of cutting emissions, pointing to a tax.

Nothing is done to reduce carbon as big polluters buy their way around paying this tax with credits and raise product prices to cover that cost, and we wind up paying for their continued polluting of the environment.

THE FREE DENIZENS OF THIS PLANET HAVE WOKEN UP..

WE WONT ALLOW JEWS LIKE ARNAUD MIMRAN TO MAKE MONEY OUT OF THIN AIR ANYMORE.. CO2 IS A USEFUL AND LIFE SUSTAINING GAS

WE WONT ALLOW JEW ROTHSCHILD BRANDED APCO MODI WHO HAS WRITTEN A BOOK ON CLIMATE CHANGE ( MUNGERILAL KA RANGEEN SAPNE ) TO MOTHBALL COAL..

JEW Arnaud Mimran Mimran declared that he donated $200,000 to Benjamin Netanyahu . Netanyahu baby has called the Mimrans a respectable Jewish family.

Six of Mimran’s codefendants were French Jews who were tried in absentia, having fled to Israel before the trial began.

French authorities cracked down on a carbon-trading scheme that cost the European Union €5 billion – including €1.6 billion in France – according to Europol.

The EU ETS was a simple “cap-and-trade” system. Under it, EU member states set a cap on the amount of carbon companies in specific sectors could produce. This could then be traded on the European market as emission allowances.

Companies that did not use their entire allowance could sell the surplus, while those that had exceeded the limit could buy more. It was also possible to purchase international credits from emissions-saving projects abroad.

Arnaud baby purchased emission allowances on the European market from abroad, using a complex network of SHELL companies and OFFSHORE accounts in Latvia, Cyprus and Hong Kong.

Because the allowances were purchased outside of Europe, they were not subject to the European Union’s 19.6 percent value-added tax (VAT). Front men acting as brokers then resold the allowances in Europe, taxes included. But instead of handing the VAT over to the authorities, they pocketed the cash to use in future trades.

But the money needed to be laundered before it could be reinvested. This involved placing it in a bank in China, where it was then handed over to businesses or transformed into playing chips at casinos, among numerous other ploys.

and Captain ' Historians ' i mean our own people not gora gaand bullsh#t , it hurts when our own historians are backdating/kicking forward our history acc to their needs , now most of what you say is getting recognized mainstream , i wish the same done with the dating of Shankaracharya

mm,buddhism did not 'spread' in India. it spread to distant lands like the far east and a bit of central asia. captain's many posts clearly indicate that Buddhism was later falsely projected as the dominant religion in India (which was 'destroyed' by sanatanis). if there is one thing captain has repeated 100 time is is that Ashoka (who never existed) was portrayed as shunning bad bad hinduism for goody good Buddhism. it is easy to see there was a plot to show India was a Buddhist country which was 'converted' to Hinduism (sic!) by sinister vedic priests. that plot failed no doubt. you can see why. ditto with jainism. Karnataka is shown as dominant Jain while Andhra as dominant Buddhist. connect the dots.

► Sanatana dharma did not need revival. ► Shankaracharya did not debate Buddhists ► Mandanamishra did not exist

all bunch of lies to reinforce that sanatana dharma pandits (indicated by Shankaracharya) fought & defeated Buddhists, and Buddhism disappeared from India. That means, now is the time to bring back Buddhism to India. Dalai Lama is one of the instruments.

Having said all that, I RESPECT BUDDHISM. BHDDHA FOUND THE TRUTH IN HIS OWN WAY. HE COULD NOT SEE IT IN SANATHANA DHARMA, SO HE TRIED ANOTHER WAY. MOST OF US FIND NOTHING IN SANATANA DHARMA OR ANYTHING ELSE. WE JUST ACT EGOISTIC AND JINGOISTIC. BUDDHA TRIED HONESTLY. HIS TEACHINGS BROUGHT LIGHT TO UNTOLD MILLIONS. IMAGINE HOW JAPAN, CHINA, VIETNAM AND THAILAND WOULD LOOK LIKE IF BUDDHA DID NOT EXIST.

sorry for the capital letters, captain, but i had to emphasize.

i may not find anything in Buddhism, Hinduism, Christianity, Sikhism, Judaism or Islam. that is because i am not good enough. i am not going to try like Buddha because i am not good enough. i will keep my Sanatana Dharma because i know there is truth in it whether i see it or not.

yes, it is not all Gora g&&%d doing the damage. significant portion is destroyed by our own people. it is the Kali effect. sinners (perhaps myself included) will be garbage collected.

you want captain's dating technique? if Shankaracharya was born in 780 AD he would be debating Muslims as well. now think.

from what I understand from captain's thoughts i can say this. Shankaracharya's part mission was to save the vedas from the decadant Nambudari brahmins. well he succeeded until Kali took a firm foothold and vedas were stolen from Sringeri. remember stealing of the vedas happened before also and Vishnu came to retrieve them. he will do so again. his first mission will be to purge sanatana dharma of evil minds who form significant percentage of Hindus.

The two ways of knowing the past history are through historical sites, antiques, relics etc and the orally transferred information through generations (vaamozhi in Mapalayam).

The transcription of the word of mouth data into palm leaves (thaliyola in Malayalam) happened only few centuries back. Mostly medicinal knowledge and religious texts were transcripted and less attention was paid for maintaining historical facts.

Both Mahabharata and Shrimad Bhagavatam were told to the curious Janamejaya, who was very angry with Takshak for killing his father Parikshit. To avenge the death of his father, he conducted the great Snake Sacrifice. Ved Vyas was upset and had taken the mauna vrata (oath of silence) during the snake sacrifice. So in order to explain him the enmity of takshak and reason behind bitting his father, ved vyas narated the story through Vaisampayan.

For building a palace Arjuna and Krishna burnt the Khandava vana and takshak's wife and son died in the fire. The story of Khandava Vana is also a major time indicator in the epic, Dhritrashtra remembering that 33 years had elapsed since Khandava vana daha when Pandava exile ended.

There is also a touching story of a bird by name Jarita and her four little sons, who has not got any feathers to fly away. The mother could fly, but she did not think of leaving her young ones in danger. She decided to die in the fire folding the young ones under her wings. But her sons did not agree to it. They entreated her to fly away. Eventually, the young birds persuaded their mother to save herself so that she can live and they will be born again as her children. Their father, Mandapala, realizing the danger his children might be in, propitiated Agni. When Agni came near the little chicks, they too prayed to Lord Agni and he relented. He saved them and soon Jarita returned along with Mandapala and they lived happily ever after.

Ved vyas and other sages were born before Kaliyuga started and hence they spoke truth. But today's historians frame lies meticulously and spread rumors with vested interests. We may not believe whatever we learn in our school text books

exactly that is the precise plan , whenever the western new age researchers/authors talk about spirituality they make sure that credit goes to Budhism , when they slip in between the lines and talk about vedic Dharma they correct it very fast cunningly so as not to reveal it to their audience

like how they credit modern maths ,science etc to Greeks ,non existent euclid etc just to show the white supremacy over Indians from whom they stole ,they are cunningly transferring every Vedic concept to Budhism

but to say that budhism didn't spread in india is i think not entirely correct ,it had it influence for some period , nothing can separate Vedas and Bharath , there will always be protectors of vedas ,

the disgusting thing is the present shakaracharyas of 4 mutts themselves are not doing any research on the dating of Adi shankara ,they have accepted what the indologists ,historians says, they could not go beyond 500 BC

i think same is the case with the magadha,mauryan empire , our puranas clearly mention magadha empire , but now it is kicked forward in time , there is some connection and secrets of Mauryans that zionists don't want us to learn

this novel may be a fiction but mauryans definitely were intelligent and had some secret knowledge , many innovations/inventions from metallurgy to maths to political sciences came from mauryan period , thanks to Chanakya

Sometimes I feel Rothchilds and cabal are cocking a snook at you by having prime minister of India now down to thier creations. That's why he hasn't done anything about Kodungallur. I have seen some videos, it's blood boiling.

What are the CERN scientists - who wanted to make the Universe do Shiv Tandav or something like that - doing? Shouldn't they be sitting with their chemistry, biology, geology, etc., colleagues and sorting things out on a more Earthly plane regarding climate change?

Two-wheeler majors Hero MotoCorp, Honda, Bajaj Auto and Suzuki Motorcycle are offering discounts of up to Rs 22,000 on BS-III models to liquidate stocks, a day after the Supreme Court banned sale and registration of such vehicles from April 1.

The companies said the offer will be valid till stocks last or up to March 31.

With 6.71 lakh two-wheelers, out of over 8 lakh BS-III vehicles impacted by the ban, dealers said the immediate effort is to sell as many units as possible before the deadline by offering "unheard of discounts" in the industry.

Here's a list of all the motorcycles that you can buy real cheap only till March 31.

1. Honda Motorcycle and Scooter India (HMSI), which had initially offered a flat discount of Rs 10,000 on its BS-III scooters and motorcycles increased it to Rs 22,000 later in the day.

3. Suzuki Motorcycle India also announced offers on its Let's scooter and Gixxer motorcycle.

On the scooter, Let's priced (Rs 47,272 to Rs 53,766), the company offered a discount of Rs 4,000 plus a free helmet, while on Gixxer (Rs 77,452 to Rs 90,421) the benefit is up to Rs 5,000 with exchange benefits of up to Rs 2,000. All prices are ex-showroom Delhi.

4. Bajaj Auto also offered discounts and free insurance on its different models, starting from the entry level Platina to Pulsar RS200 in the range of Rs 3,000 to Rs 12,000 along with free insurance.

IndiaIndia has long-emphasized that it must deal with its own development without necessarily prioritizing global warming, but since the election the country's energy minister has said that the country will continue to push for clean energy. “India does not get affected or dictated in policy or direction by any other part of the world,” said Energy Minister Piyush Goyal in February.

##########

PIYUSH GOEL

ARE YOU AND PM MODI WORKING FOR JEW ROTHSCHILD OR BHARATMATA???

WE WATCH

AS THE ENERGY MINISTER ( COAL ) IF YOU WANT SOLAR PANELS AND WIND TURBINES, WE THE PEOPLE OF INDIA WANT YOUR RESIGNATION

WE WILL NOT ALLOW MODI TO MOTHBALL COAL-- COME WHAT MAY

IT IS TIME YOU AND MODI BOTH FELT PEOPLEs POWER --IT WILL SCALD YOU BOTH

I HAVE WRITTEN THIS SIX PART POST FOR OUR USELESS DUO -- MODI AND GOEL --POODLES OF JEW ROTHSCHILD..

About 80 percent of India's electricity is produced from coal (thermal electricity), about 15 percent is hydroelectricity and about 5 percent is produced from nuclear power. Advancement is OK but why have they completely shunned the traditional coal based trains. After all the electricity is produced from coal itself which is running the trains and efficiency of an engine/mechanical process cannot be 100 percent there is more waste of power and more pollution if we generate electricity from coal and then power the engine rather than directly power the train with coal.

I don't know if people watched that david letterman nat geo - promoting US solar panels and say no to India burning coal documentary. Goel got on to a bus with letterman and pulled out his mobile and started showing off his smartphone skills. Letterman's face was like - Do you even know how the planet is run, who is in charge, etc., He totally conned him. Our minister behaved like a child with a toy when he had that phone in hand. Are our elite clueless?I can distinctly remember some other Goel on BBC - The name at the bottom of screen when they showed him as well as the anchors pronunciation was Gohel. He might as well have said go to hell. I am amazed because sitting at home I know these white snobs would happily spit at us if only they could. I am sure in private that's what they do, at least mentally. And yet our guys look up to them with glee - our ministers facial expression sometimes on TV - Glee.

IN INDIA , INDIANS ARE BEING PUNISHED FOR RESISTING THESE EVIL NIGERIANS………

MAKE IT COMPULSORY FOR ALL FOREIGN STUDENTS IN INDIA TO RECORD ATTENDANCE IN CLASS ………….

PUT CCTV AT THE COLLEGE ENTRANCE --BECAUSE THEY PAY GOOD MONEY TO TEACHERS/ PEONS TO MARK THEIR ATTENDANCE ……….

ANY AFRICAN WITHOUT PASSPORT IS AN ILLEGAL IMMIGRANT….. MOST NIGERAIN DRUG PEDDLERS HAVE BURNT THEIR OWN PASSPORTS …………………

ARE THERE NO LAWS ?....

WHY IS THE MODI GOVT APPEASING THESE DRUG PUSHERS?....

WHY IS THE COLLEGIUM JUDICIARY, NCW, NCM, NCHR , BENAMI MEDIA ON THE SIDE OF THE FOREIGN MAFIA NIGERIANS RATHER THAN DESH BHAKT INDIAN CITIZENS WHO ARE AT THE RECEIVING END….

WE ASK , WHAT IS MORE HEAVY -- ONE PHYSICAL PUNCH GIVEN TO AN EVIL FOREIGN DRUG MAFIA MAN OR LOSING YOUR DEAR CHILD TO DRUGS ?...........Go0gle for the blogpost below------……………………………………………… JEWISH RUSSIAN MAFIA VADAKAYIL …………………………..

Eros Associated Execs Admit on Hidden Camera They Will Launder Money Through Films

A CNN India exposé catches four Eros International (NYSE:EROS) associated director/producer/writers on hidden camera discussing methods for laundering money through their films.Rather than disassociate themselves with these film executives following the exposé, Eros instead worked closely with all of the individuals and even acquired a 50% interest in one of their production companies in 2016.The apparent ties to money launderers raises serious questions about Eros’s use of numerous offshore asset havens and its byzantine entity structure.Additional questions should be asked about the company’s tumultuous financial controls including (a) the use of at least 9 different auditors (b) 12 auditor resignations over the past 4 years and (c) insider allegations of the use of dummy production deals to channel assets to company family members.In order to protect U.S. investors, today we are calling for a full and thorough investigation of the companysource https://geoinvesting.com/eros-associated-execs-explain-launder-money-through-films/?utm_campaign=shareaholic&utm_medium=email_this&utm_source=email

WE KNOW WHY JEW ROTHSCHILDs RATING AGENCY S&P HAVE EROS INTERNATIONAL ( FILM DISTRIBUTORS LULLA FAMILY ) WITH A B+ RATING

High-yield DOLLAR bonds, have been opened for subscription for raising hundreds of millions -- five-year maturity, with fixed rate,

This is the first overseas debt-fund raising by any film entertainment company from India--Eros is based in Secaucus, New Jersey, USA

Knight Assets & Co., a London-based investment firm and Glaucus Research Group California LLC ( Soren Aandahl ) said that Eros may be fabricating revenue, ( a claim that Eros has denied ), and that Eros equity is worth “zero.”

Wells Fargo’s Eric Katz has questioned why Eros reports that an increasing proportion of its sales come from the UAE, rather than India. Eros says Indian buyers of content obtain rights through UAE subsidiaries to avoid tax ..

Indian companies have chosen to buy its content through offshore tax-haven shell companies. Eros itself has a UAE-based subsidiary, which owns all the international rights to its library. Eros wouldn’t disclose the counterparties driving the UAE sales, citing contract confidentiality.

In 2006, Eros International Plc, the holding company of the Eros Group, became the first Indian media company to list on the Alternative Investment Market (AIM) of the London Stock Exchange.

In 2010, Eros listed its Indian subsidiary Eros International Media Limited on the Bombay Stock Exchange (BSE) and National Stock Exchange (NSE) in India. Eros International runs a Netflix-style subscription service.

Two years ago , icy water inundated the Internet in what may have been the online equivalent of the largest chain letter ever—the ALS Ice Bucket Challenge.

In endless autoplaying Facebook videos, people hoisted buckets filled with ice water, announced their philanthropic intentions, and upended the buckets over their heads in a ridiculous manner . Breathless, they would nominate a few friends, demanding that they do the same upon penalty of a charitable donation to ALS.

In India we had few whores showing their camel toe

The Ice Bucket Challenge was immensely successful—a break-the-Internet phenomenon that spread all the way up to President Obama.

ALS Association (ALSA), raked in more then 125 million USD. Most of the money disappeared into the pockets of Jews.

LET ME TELL THESE IDIOTS—YOU CANT DO BRAIN EXPERIMENTS ON RATS.

THE REASON IS ONLY HUMANS PLUS A COUPLE OF MAMMALS LIKE ELEPHANTS, DOLPHINS , BONOBOS ETC PASS THE CONSCIOUS MIRROR AND COLOUR TEST

GOOD MONEY WASTED.

FUCK YOUR NECROSTATIN EXPERIMENTS.

LISTEN UP- YOU CUNTS .

AMYOTROPHIC LATERAL SCLEROSIS (ALS) is a form of motor neuron disease .. a progressive neurodegenerative disease

One famous ALS survivor is the physicist Stephen Hawking, who was born in 1942 and developed ALS when he was only 21 years old. He has suffered from the disease for 52 years and is still alive. His symptoms have slowly worsened over time, however. He uses a wheelchair to move around and needs special equipment in order to communicate with others.

Stephen Hawking's long life with ALS is unusual.

When you have Multiple sclerosis MS, your body attacks the myelin sheaths in your brain and spinal cord. When myelin sheaths are damaged, signals from your brain to other parts of your body get short-circuited.

ALS breaks down the actual nerve cells in your brain and spinal cord. These cells, called motor neurons, are in charge of the voluntary muscles in your arms, legs, and face. You lose control of your motor functions, and as the motor neurons break down, the myelin sheaths harden. Most people with ALS live 5 years or less after their diagnosis..

As the disease progresses, the patient gradually loses their ability to move, speak, chew, swallow, and breathe. The patient usually dies prematurely due to respiratory failure. There are two types of cells in the human nervous system: neurons and glial cells. The neurons transmit nerve impulses, which are traveling electrochemical signals.

These signals are essential in order to keep us alive. Neurons need the help of glial cells in order to do their job, however. Glial cells have many essential functions. The brain actually contains more glial cells than neurons. ALS is characterized by gradual degradation and death of neuronal axons.

An enzyme called RIPK1 ( receptor-interacting protein kinase 1 )stops myelin production in affected individuals, causing damage to neurons.. The aberrant behavior of an enzyme called RIPK1 damages neuronal axons by disrupting the production of myelin, the soft gel-like substance enveloping axons to insulate them from injury. RIPK1 as a key regulator of inflammation and cell death.

When RIPK1 is out of control, it can spark axonal damage by setting off a chemical chain reaction that culminates in stripping the protective myelin off of axons and triggering axonal degeneration—the hallmark of ALS.

RIPK1, inflicts damage by directly attacking the body’s myelin production plants—nerve cells known as oligodendrocytes, which secrete the soft substance, rich in fat and protein that wraps around axons to support their function and shield them from damage.. he activity of RIPK1 could be blocked by a chemical called necrostatin-1.

Glial cells surround neurons.More women than men get MS.ALS is more common in men.

Captaib what mistake you are doing is jumping into conclusion about babaji very fast .You are very prrceptive do some research and know more. If u wuf have not researched about asaram bapu u wud have thought he was fake guru and all.I myself am very skeptical but wanna tell u power of babaji is just wonderous.He is not god or wannabe god .unless a guru is extension of god .Work of guru is to make student ready to meet god(shiva vishnu or brahman).And this is done by advanced kriya yoga which arjun learnt to see vishwaroopam of lord krishna. its most highly advanced form of yoga.Babaji is reviver of ktiya yoga in recent times . He is a guru and guru have a lot of powers. GURU BRAHMA GURU VISHNU GURU DEVO MAHESHWARYA GURU SAKSHAT PARAM BRAHMAN TASME SHRI GURUBHYE NAMAHA.With gurus grace we do not have to do tapasya to get liberation becayse guru has already done that for us . We use his experience for libertion without any greak effort.(GOOD KARMA ARE MUST)

A CRYPTO JEW KHAN FROM KERALA ( HE SPEAKS FLUENT MALAYALAM ) BECAME AN INSTANT GURU AFTER SEEING BABAJI

HE THEN WALKED ALL OVER INDIA ( REAL WALK OF 7500 KM --NOT LIKE JEW MAO TSE TUNG WHO CHEATED BY TAKING JEW ROTHSCHILDs SHIP ) AND MET PM, PRESIDENT ETC .

LET ME QUOTE WIKIPEDIA

QUOTE:--In his autobiography Apprenticed to a Himalayan master: a yogi's autobiography (2010), Sri M (Mumtaz Ali) narrates his meeting with Babaji near Neelkant hill.[17] In his book, Sri M gave description of Babaji as golden complexioned, bare-bodied, except for a shining white loin cloth that barely reached the knees, and flowing brown hair that fell to his shoulders. He mentioned that a lovely scent emanated from Babaji and he looked divine. In the second last chapter of his book, he mentions that Babji himself was Lord Shiva. He describes seeing Babaji changing his form to Lord Shiva again and again. He also mentions that SaiBaba, Yesu, Guru Nanak and many others were disciples of Mahavatar Babaji. UNQUOTE

THIS CRYPTO JEW SRI M ( MUMTAZ ALI KAHN ) DOES NOT KNOW YESU ( JESUS ) NEVER EXISTED --BUT WAS COOKED UP IN 325 AD BY THE ROMAN EMPEROR

https://en.wikipedia.org/wiki/Mahavatar_Babaji

https://en.wikipedia.org/wiki/Sri_Madhukarnath

THE NATH TRADITION ( FOLLOWED BY SRI M ) WAS CREATED AND BACKDATED BY JEW ROTHSCHILD WITH ROTHSCHILDs TOWN OF GORAKHPUR AS THE MECCA

https://en.wikipedia.org/wiki/Nath

PANDHARPUR , IS ANOTHER ROTHSCHILDs TOWN- MECCA FOR CHITPAVAN JEWS ( ROTHSCHILD CREATED GODS KANDOBA/ PANDURANGA/ VITTALA ) ADOPTED BY SRI SRI RAVISHANKAR --WOMEN PRIESTS HAVE BEEN TAKEN IN TEMPLES .. THEY ARE THERE EVEN WHEN THEY HAVE MENSES. I HAVE FOUND THIS OUT USING A SAILOR FROM PANDHARPUR

Captain you are wrong this time i support NAME GOOD.because The real kriya yoga teacher ( never charge for kriya yoga and are not even popular . Disgracing babaji for some fake gurus is like disgracing hinduism for sri sri types. Not only fake gurus christains also connect babaji with jesus to prove themselve right . Its pure poison.

@name good ..Who told u that guru is the extension of god??U r contradicting vedic valid knowledge. God is the not any object so that u can extend it in any form .God is self realisation.God is omnipresent, omniscient, omnipotent.There is no extension. In above verses ,sakshhat means is not the identical to god ,saksshat means self realisation of god .So considering that gruru is the form of god is totally wrong.

Vikas bharti You contradict yourself you say god is omnipresent and yet say guru is not god. You say there is no extension of god . But our souls according to captain are pieces of brahman which will be united again.

STOP CHERRYPICKING and try to learn more about this great religion sanatan dharma.

I have been to Pandarpur in my Childhood. I still remember my father giving some 250 bucks to my elder brother and all the money just finished while we finished Darshan at all the temples on that river bank. The Pandits speak little Telugu too -- It was like Amma Per, Nanna Per,Nee Per ( mom name, Papa name, Your name ) Yabhai Pettu ( put 50)..... Do some little Archana kind thing only for 30 secs .......... Push you away.......Next guy-- Amma Per , Nanna per Continues at all the Shrines on the bank.................. I still remember --- This do not happen in Telugu states Temple --- You cant hand over single penny to the Pandit directly--- All must go to Hundis only----- All strictly mentioned on big notices on the Walls in all Big Temples ( Put your offerings in Hundi only )... I have also been to Ghrishneshwar ( Aurangabad) recently.......... It is a Jyohirling and No Prasadam is available there. A Pandit sitting outside takes Rs.10 ties a thread and gives Theertham........ No Rs.10 ...No Theertham......... I was about give him some Peace on that day but my Friend stopped me and reminded me.........Hang on - This is not your Telangana Andhra to Bang on .... This is some other state and then again I realized the Pandits could be Chit Pavans crypto Jews and might quickly form a group and attack me...... One should go to Srisailam in Andhra..... Every thing in Order. Prasadam counters -- Free Theertham and Prasadam at Exit by Pandits-- Free Annadhanam at lunch time..............

No Am Not talking about Tirupathi either..... Where things are much larger than life and no other Temple can match it.

What is the use of putting all your advice on ANY of the Minister's or Department's website ?

These Ministers and their Departments are - as you have rightly said - only stooges and chamchas.

They cannot even think independently - and here you expect them to demonstrate some high level thinking and show courage - like how you have done in your shipping career (going against the boss for greater good).

These people are happy to be Minister. That's it.

They want to curry favour to retain their position and power. That's it.

When the Big Boss (PM) himself doesn't give a damn, then how can pea-brained chamchas even look in a different direction ?

This is the problem here.

=====================================

One "Maria Pitache" has run back to the same hole he came from.

And people were praising this person for being a man of balls and having a "Clean" image - ala "My name is Anthony" type.

Goa is not a part of India anymore - only legally for the heck of it, it is still considered as part of India.

Tie them to the Bed/Chair claiming they have to be restrained else they wreak havoc.

Ban family from meeting the "Patient" - because the "patient" can, allegedly, harm his own family thanks to his "mental disorder".

-----------------------------------------------------------

Paradox is,

Mental Disorder is a Parachute used by Corrupt People to save their A$$es in case they are declared guilty by Judiciary.

The lawyers may not be smart enough to win the case, but they are smart enough to make sure that their client is declared "mentally unsound" so that the client and lie in a nice hospital in some nice, comfortable ward where he can carry on business as usual.------------------------------------------------------------

Jai Ho for super flexible term - "Mentally Unsound".

All these "Mentally Unsound" cases should be Re-Investigates by some High Level Authority like PMO or President's Office - so that none of the Military High Command, Vested Interests in CBI, Judiciary can tamper with the process.

Namaskar Sir,Please explain Article 147 of Indian Independence act 1947.(Article:147. Interpretation In this Chapter and in Chapter V of Part VI references to any substantial question of law as to the interpretation of this Constitution shall be construed as including references to any substantial question of law as to the interpretation of the Government of India Act, 1935 (including any enactment amending or supplementing that Act), or of any Order in Council or order made thereunder, or of the Indian Independence Act, 1947 , or of any order made thereunder )

ALL RIGHT-- SOMEBODY ASKED ME ABOUT ARTICLE 147 OF THE INDIAN CONSTITUTION .

I guess there is a brewing controversy about Indian being on a 99 year old lease -- due to some youtube video by rajiv dixit.

i guess he must have heard of hong kong being on a 99 year old lease to britain-- forced by rothschild, after the opium wars.. In 1997 china retook hongkong.

with britain not to keen to vamoose , china declared that they are ready to take over a wasteland-- and then britain ran .

Rajiv Dixit never uttered a word about Rothschild -- so his knowledge is ZERO on the subject.

what is the much touted Indian constitution?

IT IS THE SUPREME RULE BOOK FOR INDIA.

so then, what is article 147 of the indian constitution ?

" In this Chapter and in Chapter V of Part VI, references to any substantial question of law as to the interpretation of this Constitution shall be construed as including references to any substantial question of law as to the interpretation of the Government of India Act,1935 (including any enactment amending or supplementing that Act), or of any Order in Council or order made there under, or of the Indian IndependenceAct, 1947, or of any order made there under"-- BLAH BLAH FU#KIN' BLAH

WHERE IS MY BANANA -- SCRATCH SCRATCH !

The Indian constitution is an exact copy of the British system , (which evolved over time) , with a few changes to suit India.

BR Ambedkar was groomed by Rothschild to be the father of the Indian constitution-- and so he had the blue print which he touted as his own brain child..

BR Ambedkar independently contested an election in 1952 to Lok Sabha and lost miserably. He lost his deposit all the 3 times he stood for Lok Sabha elections--with even dalits voting against him .

BR Ambedkar was personally appointed by Nehru to Rajya Sabha under Rothschild’s pressure, in March 1952 and would remain there as a member until his death.

For with his British sponsorship gone, and the Indian masses hating him for writing that British rule is better than self rule — he needed a life line.

See how short Indian memories are. Today he is called a VERY popular man as per Rotshchild controlled Indian media.

Now--Rothschild ruled India, NOT the queen. Till 1857 he ruled India as the owner of British East india Company. In 1857 he decided to shed all pretense and MERGED with the british crown. He triggered a sepoy mutiny in 1857, fanned the flames , crushed the revolt using Sikhs and Mahar regiment ( BR Ambedkar's dalit community ) and officially took over India shedding all pretence --

today the naive christian john bull realises that his dear queen never ruled India, a German Jew ruled India. But even today John Bull does NOT know that their royalty has German blood.

Poor gullible John Bull !

Rotshchild made sure that British Democracy was just a sham.

The British house of Lords was totally in his payroll. ( and so is a big chunk of Indian Rajya Sabha today )

The British constitution is unwritten or, 'uncodified'-- poor John Bull.

There is no single book called British Constitution.-- poor John Bull.

.All they have is sheafs and sheafs of paper. Hundreds of treaties, laws , conventions, habits, traditions evoked out of thin air by Rothschild historians --all together make up the British constitution. These include: Acts of Parliament, Treaties, EU law, Common Law, Conventions, Royal Prerogative ( decided by Rothschild bankers ) ,Works of authority --BLAH BLAH FU#KIN' BLAH .

So, So, So -- only a Rothschild controlled lawyer or a histrorian can ever hope to understand or even faintly comprehend how Britain is governed. The British Constitution is the most amazingly stupid ( but shrewd for R ) ,least intelligible, least democratic and least accountable constitutions on this planet-- poor John Bull.

In any constitution, power has to come from somewhere and must reside with someone. In Britain it comes from the Crown and resides with the government and parliament. The people barely get a look-in, being given only the occasional chance to participate in the formal political process.

One key feature of the constitution is the continuation of arbitrary, unlimited and unaccountable power - all of which derive from the Crown. Most of these are exercised by the government, some continue to be exercised by the Queen ( who when asked to JUMP by R --only asks HOW HIGH SIR ? - never why?)

.TEE HEEEEE !

The Queen herself retains four key constitutional powers. Only the Queen herself may exercise these powers. No minister or advisor may exercise these powers on her behalf.

The power to appoint the Prime Minister

Legally, the Queen has the power to appoint whomever she wishes to be the Prime Minister. Equally, if she so decided, she could appoint nobody to the office and could keep it vacant. There is no legal requirement even that the person appointed as Prime Minister be a Member of Parliament.

SO WHEN THE MASTER COMPUTER IS FULL OF SH#T, WHY SHOULD THE SLAVE COMPUTER BOTHER ?

but i warn here --

Indian will do well to quit the commonwealth-- to shut down the MASTER VALVE , lock it --and throw away the keys.

there is NO need to split hairs on --GOIA-35 (Govt of India Act 1935) and IIA-47 (IIA-47 = Indian Independence Act 1947) -- Privy Council and falthu amendments.

Forget about any amendment done by British Parliament to GOIA-35 (Govt of India Act 1935) and IIA-47 (IIA-47 = Indian Independence Act 1947) will be binding on Supreme Court judges –BLAH BLAH,it wont happen.

SO ANGREZ BOLTA HAI -- INDIA APNAAICH MAAL HAI ?

This reminds me of a joke.

The TV anchor who said on prime time that Gays express their LOBE nay LOVE for each other by anal penile penetration sex-- this creep went to the doctor for STD.

the doctor had one look and cried-- your willie is so small and your pubic hair so long--why dont you shave it and come back--i can hardly see anything.

so our creep ook his razor and a hand mirror ans started shaving.

suddenly he saw his own LOBE --nay - LOVE hole in the mirror .

his tiny willie started getting a hop.

so our perverted creep cries--UTHO MATH BETE , APNAICH MAAL HAI !!

( dont get excited --that shit hole in the mirror is our own property )

######### SUBJECT-- SUPREME COURT TO GO PAPERLESS ####### WWWOOOAAAAHHHHH ........WHO CARES ...... WE DONT WANT COLLEGIUM JUDICIAL SYSTEM IN INDIA ...... IT IS NOT ALLOWED AS PER THE INDIAN CONSTITUTION.... INDIA IS THE ONLY NATION ON THIS PLANET WHERE JUDGES ELECT JUDGES..... WE DONT WANT "LAWYERS TO BECOME JUDGES "..... WE WANT JUDGES OF HONOUR AND INTEGRITY , CHOSEN BY A IIT / IAS TYPE EXAM SO THAT THEY HAVE THE INTELLIGENCE TO GLEAN CIRCUMSTANTIAL EVIDENCE... TODAY ALMOST ALL DIRECT WITNESS ARE FAKE , PRODUCED BY BRIBES OUT OF THIN AIR...... WE ALL KNOW WHAT LAWYERS ARE WORTH...... THE WHOLE WORLD KNOWS THE "MORAL FIBRE " OF A LAWYER, WHO LATER BECOMES A JUDGE …..SO THE LEOPARD WILL CHANGE HIS SPOTS IN A JIFFY , RIGHT ?...... THE FOOT SLOGGING UNSUCCESSFUL HAWAII CHAPPAL WEARING, BICYCLE RIDING LAWYERS BECAME JUDGES TO GET A EGO BOOST AND C0CK A SNOOK AT THEIR LUXURY CAR DRIVING LAWYER COLLEAGUES ...... WE DONT WANT JUDGES TO PLAY GOD... JUDGES CANNOT CREATE RULES BY WAY OF PIL WITH ULTERIOR MOTIVE..... JUDGES MUST ONLY INTERPRET RULES.... WE WANT JURY SYSTEM BACK IN INDIA... WE WANT "NATURAL JUSTICE" AND "PERIMETER OF CONTEXT", WHICH EGO LADEN JUDGES TOO MUCH ENTANGLED IN PROCEDURES AND PROPRIETY CANNOT GIVE ..... KARNAN SAID THAT SOME JUDGES ARE CORRUPT….. INSTEAD OF TREATING HIM AS A WHISTLE BLOWER AND THANKING HIM -- THE HIGHER JUDGES CLOSED RANKS AND TARGETED THE WHISTLE BLOWER….. WHITHER TRUTH ?....... THE CJI SENTENCED KARNAN TO SIX MONTHS JAIL FOR CONTEMPT OF COURT…… SORRY-- IF YOU KNOW THE INDIAN LAW OR EVEN WORLD LAW --"CONTEMPT OF COURT DOES NOT APPLY HERE "…… YOU CAN ABUSE THE ELECTED PM --BUT CANT POINT A TRUTHFUL FINGER AT A "LAWYER TURNED JUDGE "?....... IT IS A DISGRACE THAT THE LAW MINISTER , ELECTED PM AND THE PRESIDENT ARE INDIFFERENT , CALLOUS AND COWARDLY ……. THIS WILL BE THEIR UNDOING .. HISTORY WILL NOT BE KIND TO THEM….. THIS SHAMEFUL EPISODE WILL BE A LESSON IN JUDICIAL FORUMS FOR CENTURIES FROM TODAY…….. SUPREME COURT HAS NO LEGAL RIGHT TO IMPOSE A BAN ON PRESS ( KARNAN CASE ) ….. THIS IS MORE DAMAGING TO INDIAs IMAGE THAN THE "EMERGENCY OF 1975 "…… WHY IS MEDIA QUIET ? …..COWARDS !!... …DO THEY KNOW THAT THEY HAVE A DUTY TO PROTECT THE WATAN, THE CONSTITUTION , THE INDIAN DEMOCRACY AND A WHISTLE BLOWING HIGH COURT JUDGE ?.... READ ALL 8 PARTS OF THE POST BELOW— Go0gle for the post below—--- …………………………………….. FOREIGN FUNDED TROJAN HORSE NGOs , PIL, JUDICIAL OVERREACH, UNHOLY NEXUS VADAKAYIL ………………………….. Capt ajit vadakayil ..

Let me quote Wikipedia-QUOTE : He ruled virtuously and earned great fame and was known by the titles of "Chakravarti" (emperor) and "Sarvabhauma" (Sanskrit: सार्वभौमः). Bharata performed many sacrifices and Sage Kanva was the chief priest at those sacrifices. Bharata performed a hundred Horse sacrifices on the banks of the Yamuna, three hundred on the banks of Saraswati and four hundred on the banks of the Ganga. He again performed a thousand Horse sacrifices and a hundred Rajasuya. He also conducted sacrifices such as Agnishtoma, Atiratra, Uktha and Viswajit. He also performed many thousands of Vajapeyas.[7] :-UNQUOTE

SORRY, WE DID NOT DO ANY BLOOD HORSE SACRIFICES IN ANCIENT INDIA

ASHWAMEDHA YAGNA WAS A “VOTE OF CONFIDENCE “

ONLY GHEE AND AKSHATA ( UNBROKEN RICE ) WAS SACRIFICED INTO THE HOMAM FIRE

On 30 January, the Supreme Court sent M.V. Jayarajan, a politician from the Communist Party of India (Marxist), to jail for four weeks for calling judges shumban ( DENSE HEADED OR SLOW ON UPTAKE ) in a speech critical of judicial activism in the Kerala high court.

The Contempt of Courts Act, 1971, very clearly states that fair criticism of any case which has been heard and decided is not contempt… And as conceded by even the judges who sent Jayarajan to jail ( later ) ..

In 1970, when E.M.S. Namboodiripad, then chief minister of Kerala, made a comment on how Marx and Engels considered the judiciary to be an instrument of oppression, the Supreme Court punished him for contempt on the grounds that he lowered the prestige of judges and courts in the eyes of the people.

SORRY --JUDGES ARE NOT GOD.

JUDGES WERE LAWYERS BEFORE

EVERYBODY WHO IS NOT A HALF WIT ON THIS PLANET KNOWS WHO LAWYERS ARE -AND THEIR MORAL FIBRE

SO LEOPARDS LOST THEIR SPOTS --IN A JIFFY ?

BRAAAAYYYYYYYY !

SORRY -- THIS CANNOT CONTINUE LIKE THIS ANYMORE

WE HAVE A RIGHT TO OPINION -- THIS IS WHAT A HEALTHY DEMOCRACY IS ALL ABOUT

NO JUDGE CAN TAKE AWAY YOUR FREEDOM OF SPEECH -- WHERE YOU TELL THE TRUTH

KARNAN SAID --SOME JUDGES ARE CORRUPT . SO WHAT IS WRONG --LET HIM PROVE IT .

PUTTING "CONTEMPT " FOR SAYING THIS -- ON A HIGH COURT JUDGE HAS DAMAGED THE SYSTEM ..

THIS WILL BE PART OF JUDICIAL STUDIES FOR CENTURIES IN INDIA AND THE WORLD.

I HAD 66A ( DEFAMATION ) BEING SLAPPED ON BE BY A CRYING BOLLYWOOD SUPERSTAR .

SORRY -- TELLING TRUTH CANT BE DEFAMATION

Like many other laws, we’ve inherited the offence of ‘scandalising the court’ from the British. Initially, it was reasoned that judges were appointees of the king ( READ A JEW ROTHSCHILD ) and to abuse the judge was to abuse the king himself.

Except, the last time the UK convicted a person for scandalising the honour of the judiciary, was 1931—i.e., 84 years ago.

PUT THIS COMMENT IN MODIs, LAW MINISTERs, ATTORNEY GENERALs AND SUBRAMNIAN SWAMYs WEBSITE-- TELL SWAMY TO DO SOMETHING USEFUL FOR THE WATAN.. SWAMY IS GETTING OLD-- HE MUST DO SOMETHING GOOD WHICH WILL LEAVE A LASTING FAIR NAME FOR HIMSELF ..

Captain,Few days back some people namely Shubham bansal started a what's app group. His intentions may have been good but now it's infiltrated by hasbaras and they are slowly instigating people against you(not that I as a refer care) I thought I shall inform you. Harry Kris and jesso are amongst them.they both have UK nos. If you will please don't publish this message. If I have a grudge I will take it out on the face but this thing is sinister.

ReplyDeleteReplies

############

Capt. Ajit VadakayilMay 16, 2017 at 11:35 PM

I WILL HOLD THE ADMINISTRATORS OF ANY AJIT VADAKAYIL FANS GROUP RESPONSIBLE FOR KEEPING DECORUM --AND KEEPING THE SPIRIT OF THIS BLOGSITE

PUNISHMENTS FOR DISREGARDING -- WILL BE SEVERE INCLUDING JAIL --ADMINISTRATORS NOTE ( READ THIS SENTENCE A THOUSAND TIMES )

Rothschild used the Sayyid Brothers to grab power after Aurangzeb's death in 1707.

Jew Rothschild gae propaganda that the Sayyid brothers were the descendants of the Prophet Muhammad through his daughter Fatima .

The SAYYID brothers ensured that there was NO strong Mughal emperor after Aurangazeb.

Aurangzeb's son Bahadur Shah I defeated his brothers to capture the throne with the help of Sayyid JEW Brothers

Bahadur Shah I died in 1712, and his successor Jahandar Shah was assassinated on the orders of the Sayyid JEW Brothers--who took orders from Jew Rothschild..

In 1713, the SAYYID brothers installed Farrukhsiyar as king. In 1719, the SAYYID brothers blinded Farrukhsiyar and installed Rafi ud-Darajat as king.Then the SAYYID brothers poisoned King Rafi ud Darajat and installed Rafi ud-Darajat as king in 1719.

THE PEOPLE ALLOWED ALL THIS BECAUSE THEY THOUGHT SAYYID BROTHERs HELD THE AUTHORITY OF THE PROPHET --AFTER ALL HE WAS SAME BLOOD. BULLSHIT! IT WAS A FOUL LIE !

The SAYYID brothers then poisoned King Rafi ud-Daulah and installed a 16 year old boy Muhammad Shah as PUPPET king.

Jew Rothschild now found that the SAYYID brothers were not listening to him.

SAYYID brothers were sons of JEW Syed Abdullah Khan who claimed to be of BANU HASHIM clan of prophet Muhammad and fooled Aurangazeb by claiming he is descendant of Ali-- Fatimah's husband .

Sorry , Banu Hashim clan was Hindu.

Rothschild then got another CRYPTO JEW Qamar-ud-din Khan, Asif Jah I to murder the SAYYID brothers . JEW Asif Jah was installed as Nizam of Hyderabad by Jew Rothschild and he ruled from 1724 to 1748.

Since then Rothschild British and French brothers owners of East Indian Company played GOOD GUY / BAD GUY

In 1799 AD , Rothschild became the richest man on the planet by grabbing Jew Tipu Sultan’s gold ( Kerala temple gold ). French Rothschild were dear friends of Tipu Sultan while British Rothschild were bitter enemies.

In 1857 AD –see the progression of 100 years – a well planned long term manoevere – another Hegelian Dialectic was done which is known as THE SEPOY MUTINY

"One goat in Israel is worth more than the whole Diaspora," JEW Yitzhak Greenbaum, head of the Jewish Agency's "Rescue Committee" said- spitting on the faces of anal sex receiving Jews.. insinuating that screwing a goat anally is better .

THEY KNOW ABOUT SHIP SS PATRIA WHICH WAS SUNK BY GERMAN JEW MUNYA MARDOR OFF HAIFA WITH 1700 ANAL SEX RECEIVING GAYS..

JEW Munya Mardor was a German Jew. He and JEW Hitler worked in tandem..

The homosexual Jews in Europe got a whiff of this and a lot of them made private arrangements and fled to Palestine ( Aliyah Bet )

Aliyah bet involved 142 voyages by 120 ships.

In Palestine however the Zionist HAGANAH profiled these white Jew homosexuals . They planned to send them into some other country—Madagascar and Mauritius were considered

Finally to cut a long story short—these unfortunate homosexuals were loaded on to a French Rothschild owned ocean liner named SS Patria for dumping at the coast of Mauritius

This ship was at the port of Haifa loaded with 1,800 Jews homosexuals ( anal sex receiving )

Rothschild’s agent JEW Munya Mardor of Haganah planted a bomb meant to sink the ship will all souls on board on 25 November 1940

The ship sank with almost all the people in it

Jew Rothschilds media gave propaganda that only 267 passengers were killed on the Patria—FOUL FUCKIN’ KOSHER LIE !

https://www.youtube.com/watch?v=XfVmrMe7B10

"Sometimes it is necessary to sacrifice the few in order to save the many," Moshe Sharett, a former Israeli Prime Minister said at Patra memorial service in 1958.

During the holocaust, Jewish life had no value unless it promoted the Zionist cause.

Criminal JEW Munya Mardor, was rewarded by Jew Rothschild – he was promoted to director general of the Israel Weapons Research and Development Authority,

Munya Mardor was involved also in the sabotage of ships in which anal sex receiving Jewish ALIYAH BET refugees were being deported from Palestine. He worked with dedicated single-mindedness and a marked lack of personal feeling

In Palestine however the Zionist HAGANAH profiled these white Jew homosexuals . They planned to send them into some other country far away from the Promised land — Madagascar and Mauritius were considered

Today the anal sex receiving Jews in Israel know -- More than 15,200 anal sex receiving French Jews were herded like cattle for slaughter at Vélodrome d'hiver-- a site for the 1924 Olympics next to Eiffel Tower ..French crypto Jew Jacques Goddet gave the keys on July 15th 1942. --he knew what was happening.

Chelsea manning was freed from jail yesterday – he did only 7 years of the 35 years –as he was pardoned by Jew Obama.

HOW MANY OF YOU HEARD OF CHELSEA MANNING ( BRADLEY EDWARD MANNING ) ?

HE IS AN ANAL SEX RECEIVING GAY… NOW HE WANTS TO BE A WOMAN..

HE IS A GREAT WORLD HERO-- THE "ORIGINAL WHISTLE BLOWER " WHO MARTYRED HIMSELF.. AND THIS BLOGSITE LOVES HIM.

https://en.wikipedia.org/wiki/Chelsea_Manning

Whatever masala Manning gave was filtered to keep Jew interests intact-- the New York Times --taking the lead .. The Jews were upset as Manning gave away the list of crypto Jews in Iraq with their photos and addresses.

Same way before Panama papers were released--a kosher stuff were filtered . That is why you dont see the names of any US Jew in the list. we also know why Modi is not going after the Indians in Panama Papers !

Jewish tradition teaches that all of creation began in Jerusalem. The epicenter is Mount Moriah—lifted from Indian MERU..

Moriah is the place from which Torah instruction (horah) goes forth… The Western Wall is a surviving remnant of the Temple Mount in Jerusalem, which was destroyed by the Romans in 70 CE..

The Talmud teaches that when the Temple was destroyed, all the Gates of Heaven were closed, except for one: the Gate of Tears ( gate to the first astral layer ).

At the Wall, Jews have always poured their hearts out to God. Thus it became known as the "Wailing Wall" because of the centuries of endless tears, shed by Jews yearning to rebuild Jerusalem.

During the Bar Kochba revolt, Israel's heroes fought for every stone of the Temple. Every time the Jew were persecuted in Palestine they came running to Calicut ( my hometown ) half way across the globe crying MOMMMIIIIEEEEEEEEE.

THE ORIGINAL JEWS ARE ALL DEAD. THE JEWS IN ISRAEL ARE MERE IMPOSTERS.

We in Kerala wrote the main fabric of TORAH , the Bible and the Koran—we know. Both the Jewish and the Hindu calendars are lunar.

Yom Kippur in the Jewish calendar coincides with Durga puja in the Hindu calendar. This year in 2017, Durga Puja and Yom Kippur are on 30th Sept 2017.

Yom Kippur is a legal holiday in the modern state of Israel. There are no radio or television broadcasts, airports are shut down, there is no public transportation, and all shops and businesses are closed—as people fast.

This is like AYUDHA PUJA (the last day of Navratri )—ALL WORK AT STANDSTILL .

In 2015 the United Nations ( controlled by Jew Rothschild ) officially recognized Yom Kippur, stating that from then on no official meetings would take place on the day… This was the first time the United Nations officially recognized any Jewish holiday.

We don care if Zionist Jews agree or not. Judaism and Hebrew language was created by disgraced Namboodiris from Kerala. Hebrew is written from left to write—by these left handed disgraced Namboodiris who cannibalized their twins from inside the womb

On top of Mount Masada was a temple for Shiva and Parvati. Parvati is Durga. The symbol of Shiva Shakti ( Parvati ) merge is SIX POINTED STAR .

The pancha diyas ( five lamps) used in Hinduism are similar to the menorah lit during Hanukkah.

Christians believe that Jesus was a descendant of Abraham. Both in Christian and Jewish traditions, Abraham is the father of Israelites, and is the father of Isaac. he has another son Ishmael through Sara's maid servant Hagar.

Isaac is considered the ancestor of the Jews.

Jacob , later given the name Israel, is regarded as a Patriarch of the Israelites. Jacob is the son of Isaac and Rebecca, the grandson of Abraham and Sarah. In Koran Yakub is Jacob—a patriarch..Jacob's Ladder as an analogy for the spiritual ascetic of life.. it is a ladder of seven rounds, the passage through them being symbolical of the soul's approach to perfection. This is lifted from the Hindu souls 7 astray layers , the highest and seventh one being Vaikunta –meant for Moksha souls

2950 years ago, King David purchased Mount Moriah and made Jerusalem his capital. His son Solomon built the Holy Temple, and the entire Jewish nation gathered together three times each year on the pilgrimage festivals.

King Solomon’s mother is a Kerala Namboodiri woman named Bath Sheba .

JEWS HAVE BEEN UNGRATEFUL TO KERALA. A PARDON FROM CAPT AJIT VADAKAYIL IS HARD TO COME BY.

WHEN MY REVELATIONS REACH 97% ,THE ENTIRE BALLS AND TWATS ON THIS PLANET WILL RESONATE IN AWE—PRR TRR KRRRRRRRRR.

TODAY THE INDIAN COMMIES HAVE NO LOVE FOR THE WATAN-- THEY IDENTIFY WITH A STRANGE IDEOLOGY

REMEMBER-- ONLY THE COMMIE LEADERS ARE TRAITORS AND THAT TOO FOR FOERIGN MONEY. IN CAN VOUCH THAT THE COMMIE MASSES OF KERALA ARE PATRIOTS

KERALA COMMIES HAVE DISCARED KARL MARX, LENIN, STALIN, TROTSKY , ENGELS ETC--THEY READ FROM THIS BLOGSITE THE TRUTH--THAT ALL THESE WHITE COMMIES ARE JEWS AND AGENTS OF JEW ROTHSCHILD

WHEN CALICUT COMMIES CAME TO MY HOME FOR PARTY FUND DONATION--I EXPLAINED TO THEM WHAT IS BOLSHEVIK COMMUNISM AND WHAT IS MAO COMMUNISM. TODAY THEY USE ONLY CHE GUEVARA POSTERS --UNLIKE STUPID BONG AND TELUGU COMMIES WHO ARE STILL RATS IN A HOLE .

MAO WAS A JEW PLACED ON THE THRONE BY JEW ROTHSCHILD. MAOs GREAT MARCH WAS A LIE--HE TOOK ROTHSCHILDs SHIP. I HAVE DONE EXTENSIVE RESEARCH ON GOOGLE EARTH AND ALSO DID STUDIES IN CHINA --AND FOUND THAT IT WAS IMPOSSIBLE FOR MAO TO MARCH OVER SUCH IMPASSABLE TERRAIN

A BIG PERCENTAGE OF LAND WITH COMMIES ARE ALL GRABBED . MODI MUST PROFILE THESE ROGUES AND TAKE THEIR ILLGOTTEN LAND BACK.

COMMUNISM IN INDIA WAS ALL ABOUT GRABBING LAND, AND BURNING GOVT LAND REGISTRY OFFICES. THEY KILLED THE REGISTRARS AND EVEN RETIRED REGISTRARS

Read all 8 parts of the post belOw--http://ajitvadakayil.blogspot.in/2016/08/communist-maoist-naxalite-movements-in.html

SOME OF THE COMMIE PROFESSORS OF JNU/ DU/ JU/ FTII/ TISS ARE IN FOREIGN PAYROLL. THESE PROFESSORS LIVE FAR BEYOND THEIR SALARIES. SOME WOMEN PROFESSORS ( UGLY ONES ) GET SERVICED BY NAXAL STUDENTS AND SEPARATIST STUDENTS

Read all 11 parts of the post below--http://ajitvadakayil.blogspot.in/2016/02/jnu-den-of-anti-nationals-and-communist.html

WHAT A PATHETIC PM MODI WE HAVE-- HE CANT PROVIDE LEADERSHIP TO BREAK THE SPINE OF COMMIES AND NAXALS THE WAY NEHRU DID.

IN NARCO TEST WHICH WAS DONE LIVE ON TV-- TELGI HAVE THE NAME OF ONE MARATHA MANOOS POLITICIAN-- MODI GAVE HIM PADMA VIBHUSHAN

THESE COMMIE BASTARDS WHEN THEY CAME OUT OF JAIL- THOUSANDS OF THEM---- PISSED ON FOOD BAGS IN FCI GODOWNS ( CONCERTED EFFORT ) AND CAUSED THE GREAT FAMINE , WHICH INTRODUCED THE KOSHER GREEN REVOLUTION

OUR HOLY HUMUS LADEN TOP TOIL WAS RAPED BY ARTIFICIAL FERTILISERS AND PESTICIDES KILLING BENEFICIAL MICROBES .. 90% OF OUR LAKES WHICH SURVIVED IN PRISTINE CONDITION FOR MILLIONS OF YEARS WERE KILLED IN JUST 50 YEARS .

I have searched many programs and books online about raising our kundalini and none of them seem to be authentic or even close to the actual way, Can you please tell me some program or book that which can be useful in raising and awakening our kundalini?

Thanks

Regards

ReplyDeleteReplies################

Capt. Ajit VadakayilJune 19, 2017 at 5:07 PM

hi ar,

in this modern age there is NO instant bungee kundalini jump

you have 7 chakras

there are 7 astral layers-- the topmost one is for MOSKHA SOULS

when you raise you kundalini to sahasrara chakra it automatically means that your will get moksha ( karmic baggage reduced to NIL ) and your endless re-births have come to a final end -- and your soul ( you ) will merge with the mother field of brahman

IT IS MINDBOGGLING TO KNOW THAT YOU AS A SHIP CAPTAIN WAS GIVEN CARTE BLANCHE UNWRITTEN POWERS TO CHANGE AND CREATE YOUR OWN RULES ON THE SHIP-- IF I CAN GIVE ONE EXAMPLE ?

WELL A COUPLE OF DAYS AGO , I JOKED WITH ONE OF MY READERS THAT I AM NOT KALKI AVATAR 9.5 ASHORE-- BUT WOULD HAVE BEEN KALKI AVATAR 9.6 AT SEA

WELL IT WAS NO JOKE AT ALL . I WAS KALKI 9.7 ...

I INTRODUCED HUNDREDS OF CHANGES AT SEA --WITHOUT CARING FOR PRECEDENT--WITHOUT CARING FOR RETRIBUTION FROM IMO CUNTS

The International Maritime Organization (IMO), is a specialised agency of the United Nations responsible for regulating shipping. The IMO was established in Geneva in 1948 and came into force ten years later, meeting for the first time in 1959. Headquartered in London, United Kingdom, the IMO has 172 Member States and three Associate Members. The IMO's primary purpose is to develop and maintain a comprehensive regulatory framework for shipping and its remit today includes safety, environmental concerns, legal matters, technical co-operation, maritime security and the efficiency of shipping.

MANY TIMES , PORT STATE CONTROL INSPECTORS AND OIL MAJOR VETTING INSPECTORS WOULD POINT OUT TO A CHANGE I INTRODUCED AS A DEFICIENCY AND NOTE IT DOWN AS ONE. I WOULD BE FORCED TO CORRECT IT ON THE SPOT ( LICKING BACK MY OWN SPIT ) . AS SOON AS THAT CUNT WITH NUISANCE POTENTIAL GOT OFF MY SHIP, I WENT BACK TO THE ORIGINAL CHANGE I INTRODUCED . SAILORS LIVES MATTER .

EXAMPLE ?

IN THE SEVENTIES AROUND 400 BULK CARRIERS( HUGE SHIPS ) SANK.

THEORETICALLY THERE SHOULD HAVE BEEN 800 LIFERAFTS FLOATING AROUND FOR ATLEAST ONE OR TWO MONTHS.

THESE 800 LIFERAFTS WERE MISSING--WHICH MEANT THEY SANK ALONG WITH THE SHIP AND ALL LIVES ON BOARD

IN THE POST BELOW ,I REPRODUCE A MESSAGE I SENT TO MY COMPANY--THIS IS NO BULLSHIT

HAVE YOU EVER HEARD OF RUSSIAN AGENT YURI ALEXANDROVICH BEZMANOV A KGB AGENT WHO DEFECTED TO THE WEST--WHO FAKED HIS DEATH IN 1993 AND VANISHED ?

Yuri Bezmenov worked for the Soviet embassy in India till he defected to USA.

Yuri Bezmenov had accurately predicted more than 4 decades ago how Western would become decadent , with sexually transmitted diseases , homosexuality , loss of family values and broken homes.

This decadence would be supported by the I&B ministers of various nations who are in cahoots with the KOSHER media.

QUESTION: APCO MODI-- DONT YOU SEE THE RABBLE ROUSING GOING ON IN MIRRORNOW TV --JUST A SMALL EXAMPLE ?

Yuri Bezmenov had warned , Commie ideology was all about losing love for your motherland , by intellectual subversion -- the process of changing the perception of reality in the minds of millions of peoples all over the world ..

Yuri Bezmenov had sepcifically warned about Commie universities like UC Berkeley ( where Rahul Gandhi went to speak ) and Columbia University ( where BR Ambedkar , Brakha Dutt etc were educated ) corrupting premium Indian institutes like JNU. He had the list of commie JNU professors in white commie Jewish payroll.

Yuri Bezmenov had explained why fighting on a battlefield is the most primitive way and outdated of making war. There is no art higher than to destroy your enemy without a fight – by SUBVERTING anything of value in enemy’s country.

India has allowed thousands of Trojan horse NGOs who bribe , and use honey traps to subvert. Honey trapping is also done by MEN . In JNU woman professors are honey trapped by male students of white commie payroll. There are some five star female perception molders who come on TV , who are honey trapped –photographed while getting sex .

An example is UK Indian MP Keith Vaz needed two white male prostitutes for anal sex with poppers to dilate his asshole.

Yuri Bezmevov detailed procedure that would be used against USA by Zionist Jews

1 . Corrupt the young, get them interested in perverted sex, take them away from religion. Make them superficial and enfeebled.

2. Divide the people into hostile groups by constantly harping on controversial issues of no importance.

3. Destroy people’s faith in their national leaders by holding the latter up for contempt, ridicule and disgrace by using media and NGOs .

4. Always preach democracy, but seize power as fast and as ruthlessly as possible.

Followers

About Me

Been in command of chemical tankers (mainly) for more than 6640 days -- spread over 30 years ( a world record! ) . My Chemical posts are free for ALL sailors on this planet . Any profit making person or institution publishing extracts, must clearly write " reproduced from ajitvadakayil.blogspot.com " , - it pays to remember, that the chemical contents are patented . This blogsite will transform your mind . You yourself, are the teacher, the pupil, the messiah, the seeker, the traveller and the destination . It is no measure of health to be well adjusted to this profoundly sick society . I am from INDIA, the mother of all civilizations . I will be re-writing world history , and this will surely not gratify the evil hijackers of human history . Awaken your inner voice . Experience the joy of your own being . Your own conscience is the best interpreter . In a time of universal deceit, telling the truth is a revolutionary act . The naked truth can never be hate speech or defamation. This blogsite does not sacrifice truth on the altar of political correctness . You shall know the truth and the truth shall set you free . . STRENGTH AND HONOR - ALWAYS !.